FBI Special Agent Charles Gunther says collaboration with FinCEN, international law enforcement and U.S. banks has helped the FBI recover millions of funds stolen from customers via emerging wire fraud schemes.
The National Institute of Standards and Technology is revamping its guidance on the cybersecurity of wireless infusion pumps. Gavin O'Brien of NIST's National Cybersecurity Center of Excellence describes the effort to tackle an issue that's attracting attention in the wake of a recent FDA alert.
As criminals get more savvy about circumventing financial institutions' fraud prevention controls, fraud-fighting collaboration among institutions and law enforcement officials is becoming more important, says Clyde Langley, a former FBI agent who'll be a presenter at ISMG's Sept. 15 Fraud Summit San Francisco.
Bad news about APT: Attacks are bigger, faster and aimed at a wider variety of targets. How must organizations win board support to improve their defenses? Lockheed Martin's Justin Lachesky shares insight.
The federal government is licensing a government-built anomaly detection tool known as PathScan to Ernst & Young, which, in turn, will refine the software and market it. In an interview, DHS's Mike Pozmantier explains why the government is offering its technology to the private sector.
In her first interview since joining the HHS Office for Civil Rights as deputy director of health information privacy, Deven McGraw describes plans to relaunch HIPAA compliance audits next year and outlines other priorities.
FDA official Suzanne Schwartz, M.D., expects more medical device security vulnerabilities to come to light in the year ahead. The FDA soon will issue new guidance addressing the cybersecurity of medical devices already in use.
In the wake of hacker attacks, which have left healthcare providers uncertain about what security steps to take, the Office of the National Coordinator for Health IT is working to help organizations sort out role-based identity and access management issues, says ONC's privacy officer, Lucia Savage.
More hackers are exploiting remote-access and network vulnerabilities, rather than installing malware to invade networks and exfiltrate data, says Dell SecureWorks' researcher Phil Burdette. That's why conventional breach-detection tools aren't catching the intrusions.
Government agencies used to be the top attack target, as well as the top source of threat intelligence. How did the private sector turn the tables, and what can government do to improve? Rapid7's Wade Woolwine offers insight.
Cybersecurity adviser Patricia Titus, a former CISO, says too many women are leaving the information security field for jobs with less pressure and more work schedule flexibility. So she urges organizations to offer more incentives to attract and retain women in the field.
If malware infections and data breaches are inevitable, then why should organizations even try to be proactive? Isn't a reactive stance more appropriate? Not so, says Marcin Kleczynski, CEO of Malwarebytes.
When it comes to healthcare payments, fraud tends to come in two flavors: Organized and opportunistic. What are the biggest gaps in detecting and preventing these schemes? IBM's Robert McGinley shares insight.
The bad news is that the new KeyRaider malware has so far compromised more than 225,000 Apple accounts worldwide. The good news, according to Ryan Olson of Palo Alto Networks, is that only modified, or "jailbroken," ioS devices are at risk.