Skip to main content

Security

SPONSORED
By Proofpoint | 10:36 am | March 31, 2017
The new mantra for healthcare in the Information Age could easily parallel security in today’s evolving cybercrime era – it’s about people.
By Jessica Davis | 04:29 pm | March 29, 2017
The agency currently uses a dozen approved cloud service providers.
By John P. Donohue | 03:30 pm | March 29, 2017
To fend off increasingly sophisticated ransomware, phishing and other malicious attacks, infosec professionals and software vendors can tap into ATD tools to more effectively share threat information. 
By Bernie Monegain | 02:53 pm | March 29, 2017
Email archives, business documents, intellectual property and source code are in hackers’ crosshairs.
By Jessica Davis | 01:02 pm | March 29, 2017
The self-extracting variant, which links to a Dropbox account run by hackers, will shut down when certain programs are found on the system.
By Jessica Davis | 11:48 am | March 28, 2017
When servers are configured to allow anonymous access, hackers can infiltrate an organization and launch a cyberattack.
By Jessica Davis | 01:05 pm | March 27, 2017
Urology Austin, a healthcare provider with locations throughout central Texas, began notifying its patients March 24 that hackers may have accessed patient records that included names, dates of birth, addresses, medical information and Social Security numbers.
By Mike Miliard | 09:05 am | March 27, 2017
"Any time we contract with any vendor on any of the relationships, then we go through the analysis: Are they a business associate or not?" said Beaufort Memorial Hospital CIO Ed Ricks.
By Jessica Davis | 12:42 pm | March 24, 2017
The former director of the conservative Heritage Foundation think tank is a staunch opponent of civil rights for transgender people, whom he'll be tasked to protect as OCR director.
By Jessica Davis | 05:45 pm | March 20, 2017
The good news? Hacking was down and only comprised 12 percent of reported incidents during the last month.