The risks posed by third-party vendors are a top concern for Aaron Miri, CIO of University of Texas at Austin's Dell Medical School and its affiliated UT Health Austin group practice. He explains steps he's taking to help mitigate those risks.
Asset management - it's not the most exciting thing in the world. In an industry with technologies like automation, machine learning, and AI, asset management doesn't get a whole lot of attention, but it's foundational and one of the biggest problems organizations face today.
Security teams' jobs continue to get...
Organizations face a variety of security challenges as they attempt to secure their environments from the ever-changing threat landscape. As they look to gain more insight from their security devices, while gaining improved speed to detect and respond, managed detection and response is becoming a go-to solution.
A warning that a smartwatch marketed to parents for tracking and communicating with their children could be coopted by hackers leads the latest edition of the ISMG Security Report. It also reviews how a DNS hijacking campaign is hitting organizations and how "dark patterns" trick users.
Mitigating medical device cybersecurity risks can be a matter of life and death, warns federal adviser and security expert Anura Fernando, who says ensuring that medical device network connections are properly managed, monitored and secured is "much like keeping a weapon in a safe with the safety on."
A "flaw" in the file format of the DICOM standard for communication of medical imaging information could be exploited to hide malware in MRI and CT scans alongside patient data, according to a new research report. But the developer of DICOM contends the feature isn't a flaw and any risks can be mitigated.
Today's organizations face a daunting set of challenges, along with some incredible opportunities, within the context of advancing their existing security infrastructure. As practitioners continue to seek out new techniques for managing the sheer volume of security data at their fingertips there are tangible benefits...
U.S. CERT has issued a fresh warning about a newly discovered Trojan called Hoplight that is connected to a notorious APT group with links to North Korea. The malware has the ability to disguise the network traffic it sends back to its originators, making it more difficult to track its movements.
Google's latest security feature enables the use of Android phones as a security key, eliminating the need for a separate token or hardware device. The free feature is potentially more appealing that Google's Titan security keys, which cost $50.
A new type of malware, dubbed TajMahal, offers its users a host of espionage techniques, including the ability to steal documents sent to a printer queue and pilfer data from a CD, Kaspersky Lab reports. But researchers have only identified one victim so far.
In recent years, Las Vegas has become a prototypical smart city. Between its fully autonomous vehicles and its array of IoT sensors, the city aims to embrace innovation without compromising the security of its 650,000 residents and 42 million annual tourists.
Yet local governments know that internet-connected...
Much like private companies, state and local governments of all kinds are going through a digital transformation at an unprecedented pace: migrating sensitive data to the cloud, installing internet-connected infrastructure, and offering services powered by smart devices.
At the same time, cyber-criminals are also...
Browser-based cryptocurrency miners are falling out of favor as virtual currency prices remain low, IBM says. But the company says malware-based miners are coming back, including fileless ones that rely on Powershell. Here's the lowdown.