Security
Interoperability
Organizations said they will advance testing of a secure digital ID proof-of-concept program that is designed to reach millions of consumers, while Trusted Key also announced a $3 million round of funding.
Privacy & Security
Start by looking for unusual network activity, practicing situational awareness and using old school methods to combat phishing.
Privacy & Security
Discovered in October, the fundamental WP2 protocol vulnerability can cause a complete loss of control of data and let a hacker launch a man-in-the-middle attack.
IT Infrastructure
The planned update is just the latest move to improve the National Health Services since WannaCry.
IT Infrastructure
Hackers hit the IT vendor of three Center for Orthopaedic Specialists locations in February, which locked out users and encrypted patient data.
IT Infrastructure
MEDantex left a portion of its customer portal open to the public after it rebuilt its site due to a ransomware attack.
Privacy & Security
Orangeworm is targeting the sector and associated vendors for what Symantec researchers believe is to conduct espionage on the industry.
Analytics
Artificial intelligence-powered threat detection and response can be very valuable – as long as it's researched and deployed with care and planning.
Privacy & Security
In an RFI, a House committee outlines the severity of cybersecurity issues plaguing legacy software and equipment and asks stakeholders to begin tackling these challenges.
IT Infrastructure
While more organizations are warming to the concept of paying hackers to discover and report on security vulnerabilities, there's still some confusion and ambiguity about the idea.