A new methodology for assessing whether a medical device cybersecurity issue is likely to pose a danger to patients should be available later this year, says cybersecurity researcher Billy Rios in this in-depth interview.
As cyber threats grow in diversity and sophistication, AV-based protection offers less and less effective protection for organizations, creating a pressing need to replace existing signature-based endpoint protection software with a more advanced solution.
Download this paper to get a seasoned CISO's perspective...
The U.S. government's intrusion detection and prevention program known as Einstein has limited ability to detect breaches of federal information systems, according to a new Government Accountability Office report.
As 2016 begins, financial institutions find themselves at a fateful crossroads. They continue to see the impact of retail payments breaches, such as those that struck Target, Home Depot and other merchants.
This fresh research looks at:
Retail breach impact and emerging payments;
The latest fraud trends...
Global restaurant chain Wendy's is investigating a suspected data breach following fraud patterns tied to credit and debit cards used at some of its locations. Two card issuers confirm that they've seen signs of related fraud in some U.S. regions.
Hackers are turning over big profits by holding data hostage in return for a ransom payment. Ransomware is the fastest-growing type of malware, targeting anyone from mom-and-pop shops to large government entities. Once files are encrypted, hackers are asking victims for payments ranging from $200 to tens of thousands...
Israel has reportedly foiled a "severe cyberattack" launched against the Israeli Electricity Authority. The malware attack doesn't appear to have resulted in any disruption to the country's power grid, but many government systems remain offline.
Sophisticated phishing campaigns, increasingly targeted because of social media, are fueling business email compromises - a growing wire fraud scheme that is attacking businesses worldwide, says Jim Hansen of PhishMe.
The Ukrainian energy sector is being targeted by fresh phishing attacks, the country's computer emergency response team warns. But it's not clear who's behind those campaigns, or a recent malware infection at Kiev's main airport.
Extortion campaigns waged by cybercriminals are expected to become more damaging in 2016, putting additional pressure on CISOs to enhance protection of internal networks and educate employees about extortionists' techniques, says iSight Partner's John Miller.
Virtualization promises to boost efficiency and cut costs, making it an important element in your IT department's efforts to do more with less. Whether you're running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other...
For virtualization security, there's no one size fits all solution...and trying to fit your organization's specific needs into the wrong security product can be a costly mistake. Do you know how to pick the right option for your organization?
Download this white paper to explore:
Different virtualization...
Check fraud - it not only won't go away, but
it is morphing to keep pace with consumers'
digital banking habits. Although the number of checks written by consumers has decreased significantly, the
reverse is true about dollars lost to check fraud.
David Barnhardt, Vice President of Product
Management, Payment...
Thought leaders within the IT community are beginning to view cybersecurity not just as part and parcel of the everyday cost of doing business, but as a direct driver of business continuity and bottom-line growth. This shift in perception has begun to have a dramatic impact on the position and role of security...
New proposed FDA cybersecurity guidance is an important step in getting medical device manufacturers more focused on the risks posed by their products as they're used in healthcare settings, security experts say.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.