The traditional Security Operations Center is out, and the new Security Intelligence Center is in. Greg Boison of Lockheed Martin tells how
security leaders are winning business support for this evolution.
Download this white paper to explore
Why SIC is the new gold standard;
How to present the SIC...
In the year ahead, federal regulators need to ramp up their efforts to enforce HIPAA compliance among business associates because so many lack mature security controls, argues security expert Mac McMillan of the consultancy CynergisTek.
The experience of a dozen health plans that participated in a cyberattack drill spotlights the need for a well-thought-out incident response plan, says John Gelinne of Deloitte Advisory Cyber Risk Services.
Turns out electronic learning products can be bad for children's privacy - and for their parents too. The VTech breach highlights how, despite repeated warnings, too many manufacturers continue to not take security seriously.
In yet another HIPAA enforcement action by a state attorney general, the New York AG has fined the University of Rochester Medical Center after a nurse practitioner gave patients' information to her future employer without getting the patients' permission.
Top American and Chinese government officials, meeting this week in Washington, agreed to create a common understanding on cyberthreats and how to respond to them, but the two sides offered different characterizations of the tone of the dialogue.
The breach of Hong Kong toymaker VTech highlights security experts' growing concern over manufacturers selling devices - for enterprises, medical purposes, schools as well as homes and now toy boxes - that don't appear to be secure by design.
The Chinese government concedes the attack on U.S. Office of Personnel Management computers emanated from China, but it contends the culprits were criminals, not individuals working for the Chinese government or military. Some experts in the United States aren't buying the Chinese government's explanation.
Target Corp. has reached a proposed $39.4 million settlement with a group of financial institutions that sued the retailer over fraud losses and expenses suffered as a result of Target's December 2013 data breach.
Data breaches continue to have a major financial impact on organisations, as well as on their reputations. The 2015 Verizon Data Breach Investigation Report (DBIR) evaluates recent breaches and vulnerabilities, and looks at how they affected organisations in multiple industries and countries. While the DBIR is full of...
The average total organisational cost of a data breach has been on the rise. In part, these costs are due to delays in breach detection, which can often take weeks to months after the initial compromise. Delays occur because security teams do not have actionable forensic data to pinpoint compromised hosts or identify...
Today, inundated with frequent headlines about high profile security breaches, cyber risk has joined
the list of concerns for business executives. Executives need to know if their organisation is managing cyber risk adequately, and they must be able to communicate that information upward to their board members who...
Gen Y has raised the bar when it comes to adoption of new technology and the speed at which we must innovate. For example, they're much more likely to use mobile banking than their elders, and more likely to go elsewhere if banks do not offer the mobile services they desire. Gen Y is full of fast movers when it...
Over the last twelve months the world has seen costly and destructive cyberattacks target organizations of all sizes regardless of industry or geography. With so much at stake, organizations need to know where their security programs are effective and where they are falling short.
Tenable has developed the...
Social engineering is certainly not a new problem. But it's a persistent one that continues to grow, and with seemingly no end in sight because it preys on a natural human tendency to trust.
While most financial institutions have taken significant steps to combat social engineering through user education and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.