A Twitter posting by Pacific Northwest National Laboratory, which conducts IT security research and development, says: "A sophisticated cyberattack has shut down Internet and e-mail at PNNL. Full access will be restored once we can repel further attacks."
The U.S. Department of Health and Human Services' Office for Civil Rights entered into a resolution agreement with the University of California at Los Angeles Health System to settle violations of the HIPAA Privacy and Security Rules.
Emerging technology is often touted for enhancing security. But if not properly deployed and integrated, these technologies can hinder rather than improve security.
Health insurer WellPoint Inc. has reached a settlement with the Indiana Attorney General's office over a delayed notification about a consumer data breach that affected the records of 32,051 people.
New mobile technology is behind a growing public concern about Internet security, says former Transportation Security Administration CISO Patricia Titus, who now holds the same post at Unisys.
"How can the nation afford not to have what we are trying to accomplish under the Cybersecurity Enhancement Act," says bill sponsor, Sen. Robert Menendez, D-N.J.
We all know, as a result of recent breaches, Sony is in the market for a security leader. I reached out to some hiring managers and asked them: What would you look for in Sony's first CISO?
A key factor in minimizing the risk of a breach when working with business associates is to provide these partners with the minimum amount of information they need to perform their services, says security expert Brian Lapidus.
The new virtualization guidance issued by the PCI Security Standards Council urges organizations to take a risk-based approach when dealing with virtualization methods, especially within cardholder data environments.
Characterizing LulzSec as cyberterrorists, department officials confirmed that LulzSec appeared to have gained access to the e-mail accounts of at least seven department employees, with the pilfered information posted online by the group.
Leigh Williams says preventing online data breaches requires cooperation within the online ecosystem from domestic and international organizations. Spearheading and maintaining that cooperation requires federal oversight, he contends.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.