Initial reports suggested that Russian hackers could behind an attack against JPMorgan Chase, and perhaps other U.S. banks. While it's still far from clear who the culprits are, experts discuss the potential hacking motivations of a nation-state.
The killing of an unarmed teen by police in Ferguson, Mo., has Anonymous sympathizers disagreeing on Twitter when and how to expose the identity of the shooter.
A multi-layered approach known as "context-aware security" is the most effective strategy for fighting both insider and external cyberthreats, says Gartner analyst Avivah Litan, who explains how this strategy works.
Operators of media sites should consider adoption of the cybersecurity framework in the aftermath of the recent domain name systems attacks aimed at The New York Times and Twitter.
White House Cybersecurity Coordinator Michael Daniel sees significant savings in continuous diagnostics because the automated approach to identifying systems vulnerabilities could replace costly checklist compliance reporting.
Spear-phishing attacks are up and targeting individuals across all industries, according to a new warning from the FBI. Security experts advise how organizations can better detect and prevent attacks.
A cybergang threatens a blitz of Trojan attacks aimed at 30 U.S. banks, according to RSA. What steps should all banking institutions take now to prepare? RSA's Mor Ahuvia offers insight and advice.
Federal regulators stirred up controversy when they sent a letter to five healthcare associations warning that the government will prosecute healthcare providers who "game" the system by using EHRs to submit fraudulent bills.
An advisory panel wants a multi-factor authentication requirement included in Stage 3 of the HITECH Act electronic health record program. Find out under what circumstances that requirement would apply.
Medical identification theft is on the rise. Will healthcare reform, as recently affirmed by the Supreme Court, help reverse that trend? Here's why it's difficult to predict the impact of reform.
In a tribute, we remember Terrell Herzig, information security officer at UAB Health System, an innovator who was passionate about sharing best practices for protecting sensitive information.
The statistics revealed in the ACFE's new 2012 Report on Occupational Fraud and Abuse are all very real. Here are my insights on occupational fraud and steps leaders can take to detect these crimes.
A U.S. appellate court decision in a case involving a jail term for a HIPAA violator offers an important reminder of the potential consequences for accessing patient records without a valid reason.
The nation needs to adopt information risk management to guide its approach to critical IT infrastructure protection, says Andy Purdy, a former DHS senior cybersecurity leader.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.