Akamai's acquisition of DDoS mitigation provider Prolexic Technologies is a sign of how the DDoS-defense marketplace is maturing at a time when attacks are becoming more sophisticated.
A new takeover scam that the FBI calls a "man-in-the-e-mail" attack has drained $1.65 million from three Seattle-area businesses' accounts. Learn what steps to take to avoid becoming the next victim.
Obama administration officials say hundreds of technical issues have been ironed out of the federal HealthCare.gov site, but have all of the security concerns been adequately addressed and tested?
As long as organizations have operated online, attackers have looked for ways to attack them. And as the Internet has evolved, the methods and techniques used have changed to take advantage of the vulnerabilities that exist. The challenge with Web security lies in that changing nature. Attackers are always one step...
Governments and others using cloud-based services should keep 10 security tips in mind, including making sure they can maintain control of their data if a service provider goes bankrupt, says Dimitra Liveri, co-author of a new report.
Ensuring strong authentication of users while maintaining ease of use is a difficult challenge for health information exchanges nationwide, says David Whitlinger of New York's statewide HIE.
With cyber attacks on the rise, many organizations rely on intrusion prevention systems (IPS) to detect and stop attacks in their networks. But to counter increasingly sophisticated threats, IPS is now evolving into next-generation intrusion prevention systems (NGIPS). What drives the need for these new systems? And...
Joy Pritts, chief privacy officer at the Office of the National Coordinator for Health IT, offers insights on the best ways to prevent data breaches involving lost or stolen devices or records snooping.
Twitter's announcement that it's adding "forward secrecy" encryption to its sites should serve as a reminder that organizations need to continually assess the risks to their organization, experts say.
Business associates have been involved with fewer major health data breaches so far this year, compared with 2012. Are they getting better at prevention, or are they just under-reporting breaches?
Researchers have a new option for securely accessing more than 400 billion federal healthcare records via a virtual data center, says Niall Brennan of the Centers for Medicare and Medicaid Services.
Attempts to shame China haven't been effective in stopping that country from pilfering intellectual property from the computers of American companies, according to a new report to Congress from a special commission.
Application white-listing is the number one strategy in Australia's Defence Signals Directorate (DSD) list of 35 Strategies to Mitigate Targeted Cyber Intrusions; it is deemed an essential control. Application white-listing gives administrators visibility and control over applications that are allowed to communicate...
Federal investigators announced five more arrests this week in connection with a $45 million ATM cash-out and prepaid card fraud scheme. Learn why experts expect these types of crimes to become even more common.
FS-ISAC has issued a white paper with tips on streamlining third-party software risk assessments. One member of a new working group explains why the adoption of standard security controls is so critical.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.