At a time when workers use more apps than ever to do their jobs - and from more locations and devices than ever - traditional IAM is simply not sufficient, says David Meyer of OneLogin. Cloud-Based IAM is what organizations truly need.
A new coalition of leaders from government, industry and privacy advocacy groups hopes to help provide a framework for reaching a consensus on how to use IT to ensure society's security while protecting individuals' privacy, says Art Coviello, an organizer of the new Digital Equilibrium Project.
A new alert from the Department of Homeland Security regarding more than 1,400 software vulnerabilities in an older line of systems used to dispense medical supplies at hospitals spotlights the challenges involved in securing legacy equipment, including medical devices.
MedStar is but the latest healthcare entity to fall victim to a ransomware attack. What can organizations do proactively to improve their ransomware defenses and response? PhishMe CEO Rohyt Belani offers insight.
Ransomware is such a serious cybersecurity concern that the FBI has issued new guidance and yet another alert about the threat. Nevertheless, experts say too many organizations are still unaware of the risk, muchless how to mitigate it.
Although organizations in a number of business sectors, including healthcare, have been targeted by ransomware attacks in recent months, a new report reveals that government agencies also were targeted hundreds of times during the second half of last year, but no ransoms were paid.
In this video interview, cybersecurity attorney Chris Pierson says recent Federal Trade Commission actions linked to data security and breach response could influence other governmental agencies.
Many organizations both misunderstand and underestimate the power and scale of today's DDoS attacks, says Darren Anstee of Arbor Networks. And these lapses may be negatively impacting enterprises' DDoS defense.
David Finn, a former healthcare CIO, says he agreed to join a new Department of Health and Human Services cybersecurity task force because he supports its mission of involving representatives of all healthcare sectors in the effort to tackle challenges. In this interview, he outlines key security issues.
Tools and techniques need to be identified to aid law enforcement in gathering evidence from devices, such as smartphones, while safeguarding the security and privacy of individuals. Can stakeholders find that middle ground?
A March 28 cyberattack that may have involved ransomware forced MedStar Health, a 10-hospital system serving Maryland and the Washington, D.C., area to shut down many of its systems to avoid the spread of the virus.
PCI DSS 3.1 is scheduled to become effective as of June 30, 2016, and with that comes several changes - and challenges for security professionals. In an interview, Dell's Tim Brown discusses why network security is instrumental to ultimately meeting PCI DSS 3.1.
A new report, Threat Horizons 2018, from the Information Security Forum paints a fairly pessimistic picture of enterprises' ability to protect their IT from cybercriminals over the next two years. In an interview, ISF's Steve Durbin discusses what organizations can do to mitigate cyberthreats.
The FBI has successfully retrieved data off the iPhone used by one of the San Bernardino shooters and is withdrawing its motion to have a federal court order Apple to help the government unlock the phone. A federal law enforcement official declines to characterize the information discovered on the device.
Until the IRS takes appropriate steps to resolve security control deficiencies, taxpayer data will remain "unnecessarily vulnerable" to inappropriate use, a Government Accountability Office audit report warns.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.