Skip to main content

Privacy & Security

By Bill Siwicki | 01:09 pm | April 04, 2017
Deploy detection tool, use threat intelligence services and train your employees now to stay ahead, Beazley report says.
By Jessica Davis | 12:08 pm | April 03, 2017
The hacker group APT 28 - responsible for leaking data on Olympic athletes in 2016 - stole confidential medical data of athletes that appear to have been removed from IAAF’s server.
By Jessica Davis | 12:37 pm | March 31, 2017
Washington University School of Medicine employee responded to a phishing attempt masked as a legitimate request in December, but medical school officials didn’t learn of the incident for seven weeks.
SPONSORED
By Proofpoint | 10:36 am | March 31, 2017
The new mantra for healthcare in the Information Age could easily parallel security in today’s evolving cybercrime era – it’s about people.
By Jessica Davis | 04:29 pm | March 29, 2017
The agency currently uses a dozen approved cloud service providers.
By John P. Donohue | 03:30 pm | March 29, 2017
To fend off increasingly sophisticated ransomware, phishing and other malicious attacks, infosec professionals and software vendors can tap into ATD tools to more effectively share threat information. 
By Bernie Monegain | 02:53 pm | March 29, 2017
Email archives, business documents, intellectual property and source code are in hackers’ crosshairs.
By Jessica Davis | 01:02 pm | March 29, 2017
The self-extracting variant, which links to a Dropbox account run by hackers, will shut down when certain programs are found on the system.
By Jessica Davis | 11:48 am | March 28, 2017
When servers are configured to allow anonymous access, hackers can infiltrate an organization and launch a cyberattack.
By Jessica Davis | 01:05 pm | March 27, 2017
Urology Austin, a healthcare provider with locations throughout central Texas, began notifying its patients March 24 that hackers may have accessed patient records that included names, dates of birth, addresses, medical information and Social Security numbers.