FDA official Suzanne Schwartz, M.D., expects more medical device security vulnerabilities to come to light in the year ahead. The FDA soon will issue new guidance addressing the cybersecurity of medical devices already in use.
Policymakers must consider three factors before imposing sanctions in retaliation for state-backed hacks: Confidence in its attribution of responsibility, the impact of the incident and the levers of national power at a state's disposal.
There is an infinite amount of malware code at attackers' disposal yet a finite number of skilled security staff able to deal with
the volume of noise they create daily. If the last year of unending breach headlines is a barometer, it's safe to assume that legacy
approaches to security will not cut it in this new...
Underground cybercrime forums continue to evolve, offering services ranging from cybercrime toolkits and money laundering to bulletproof hosting and a service that reviews exfiltrated data for corporate secrets, says cybersecurity analyst Tom Kellermann of Trend Micro.
The U.K. National Crime Agency has charged four teenagers with using the "Lizard Stresser" distributed denial-of-service tool to disrupt the websites of a national newspaper and a school, as well as gaming companies and online retailers.
The FDIC says cybersecurity is a business continuity issue. So it's offering banks a series of videos and exercises to help them address key threats, including account take-over, malware infections and other risks related to third parties.
Is a hackable car defective? The auto industry likens hack attacks to troublemaking. But legislators and regulators are taking a closer look at connected cars and the safety risks posed by software bugs.
Significant cost drivers have placed the cloud firmly in the sights of CIOs. Unfortunately, these drivers have often been stalled by a fear that the cloud is an exposed environment that is not only difficult to secure but also a regulatory nightmare. Fortunately, there are concrete mechanisms that can protect cloud...
An appellate court has upheld the Federal Trade Commission's authority to play a key regulatory role in cybersecurity as it relates to the protection of consumer data against breaches. Legal experts evaluate the long-term implications.
Wholesale de-risking by financial institutions may seem like a viable compliance strategy when dealing with certain customers, but in the long-term may cause more harm than good.
Which factors are causing financial institutions to de-risk?
What are the unintended consequences of this?
What should an intelligent...
Innovations in healthcare IT are empowering patients like never before. But with big benefits come major risks. Medical data, worth 10x more than a credit card number on the black market, is extremely valuable to cybercriminals. As a result, cyber attacks in healthcare are skyrocketing up 125% since 2010. Inbound...
When it comes to fraud, data breaches, and other cybercrime activities, credit unions tend to get far less coverage in the media. Small banking and credit unions have to keep pace and make technology and innovation an integral part of their strategy. However, if not properly managed, this technology race can...
To help mitigate the risk that blackmail and extortion campaigns might target employees, employers' security teams must regularly review post-breach data dumps as well ramp up enforcement of their corporate security policies, says Stephen Coty of Alert Logic.
Rand Corp.'s Martin Libicki sees circumstances in which a weaker economy could curtail Chinese cyber spying on U.S. companies. Then again, he says, the Chinese government could see spending money on hacking as an economic stimulus.