More than two-thirds of IT security specialists working for the U.S. federal government say their agencies are ill-prepared to adequately defend their IT systems, a new survey reveals.
Our inaugural Fraud Summit on Oct. 22 at the Meadowlands in New Jersey will feature an impressive lineup of information security leaders offering timely insights about practical risk mitigation strategies.
IT systems shuttered during the partial government shutdown are more vulnerable than usual to cyber-attacks as they're restored, security experts familiar with government IT systems say.
Fraudsters are using DDoS to distract banks during account takeover attempts, says fraud prevention expert Avivah Litan, who highlights DDoS trends to watch in 2014 and reviews how attack techniques have evolved in the last year.
Attorney Maureen Ruane, who has prosecuted dozens of healthcare fraud cases, explains how the rollout of electronic health record systems at hospitals and clinics is creating new potential opportunities for fraud.
The Department of Health and Human Services and some states are still busy working out technical issues to improve the functionality of health insurance exchanges that went live under Obamacare Oct. 1.
Security teams struggling to detect signs of threats hidden in mountains of data are attracted to big data analytics. But experts advise security professionals to take an incremental approach, starting out with smaller projects.
Mary Galligan, the just-retired head of the FBI's New York cyber unit, says the federal government can do more to help businesses take all the right steps to protect sensitive information and prevent breaches.
Banking institutions and merchants are fighting back against cyber-attacks by sharing information and assisting law enforcement investigations, says Julie Conroy of Aite, which has issued a report about account takeover and cyberfraud trends.
Open enrollment season for Obamacare as well as employer-offered health insurance is prime time for phishing scams, so it's urgent to remind consumers about the risks, security experts say.
Organizations should make sure their business continuity plans address all key business processes and customer-facing applications, says Dan Shannon of core processor Fidelity Information Services.
Nations' policies for mitigating cyberthreats can conflict with efforts to promote cyber-enabled global trade, cautions Allan Friedman, research director of the Brookings Institution's Center for Technology Innovation.
To mark his induction into the National Cyber Security Hall of Fame, Purdue University Computer Science Professor Eugene Spafford offers insights on key challenges, including overcoming senior executives' misperceptions about key issues.
Face-to-face and over-the-phone social-engineering schemes are increasingly used to perpetrate fraud, highlighting the need for more education and real-time transaction monitoring, says Gartner's Avivah Litan.
Organizations in all sectors should take steps now to avoid security and operational risks associated with Microsoft's plans to discontinue support of the Windows XP operating system next year, security experts say.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.