Skip to main content

Security

Interoperability
By Bill Siwicki | 03:08 pm | May 02, 2018
Organizations said they will advance testing of a secure digital ID proof-of-concept program that is designed to reach millions of consumers, while Trusted Key also announced a $3 million round of funding.
Privacy & Security
By Tom Sullivan | 10:43 am | May 02, 2018
Start by looking for unusual network activity, practicing situational awareness and using old school methods to combat phishing.
Privacy & Security
By Jessica Davis | 05:35 pm | May 01, 2018
Discovered in October, the fundamental WP2 protocol vulnerability can cause a complete loss of control of data and let a hacker launch a man-in-the-middle attack.
IT Infrastructure
By Jessica Davis | 04:01 pm | May 01, 2018
The planned update is just the latest move to improve the National Health Services since WannaCry.
IT Infrastructure
By Jessica Davis | 03:27 pm | April 26, 2018
Hackers hit the IT vendor of three Center for Orthopaedic Specialists locations in February, which locked out users and encrypted patient data.
IT Infrastructure
By Jessica Davis | 01:41 pm | April 25, 2018
MEDantex left a portion of its customer portal open to the public after it rebuilt its site due to a ransomware attack.
Privacy & Security
By Jessica Davis | 02:13 pm | April 24, 2018
Orangeworm is targeting the sector and associated vendors for what Symantec researchers believe is to conduct espionage on the industry.
Analytics
By Mike Miliard | 10:20 am | April 24, 2018
Artificial intelligence-powered threat detection and response can be very valuable – as long as it's researched and deployed with care and planning.
Privacy & Security
By Jessica Davis | 02:51 pm | April 23, 2018
In an RFI, a House committee outlines the severity of cybersecurity issues plaguing legacy software and equipment and asks stakeholders to begin tackling these challenges.
IT Infrastructure
By Bill Siwicki | 02:25 pm | April 23, 2018
While more organizations are warming to the concept of paying hackers to discover and report on security vulnerabilities, there's still some confusion and ambiguity about the idea.