Skip to main content

Privacy & Security

Analytics
By Tom Sullivan | 08:06 am | October 10, 2016
A triptych of experts share insights and advice about cyberthreat intelligence sharing, plotting a security strategy and safeguarding data against attacks. 
By Jeff Rowe | 02:48 pm | October 05, 2016
After a security researcher found that the unencrypted devices could be forced to deliver unauthorized insulin doses, J&J sent patients a letter but also said the probability of such an attack is low. 
By Jessica Davis | 12:08 pm | October 05, 2016
New Jersey Spine Center was attacked by Cryptowall, which locked up its EHR, backups and phone system. Marin Healthcare District in California lost two weeks of backup data during restoration.
By Bill Siwicki | 08:10 am | October 05, 2016
Security professionals should begin by making anti-malware efforts relevant and routine. From there, leverage the technology you have and make sure users know that software can only do so much to protect them. 
By Bill Siwicki | 08:08 am | October 05, 2016
Almost all are aware that they are actively being eyed by cybercriminals, but only 22 percent said they are fully prepared to combat criminal security breaches, KPMG noted in a new report.
By Jessica Davis | 02:59 pm | October 04, 2016
Oxford, Mississippi-based Urgent Care Clinic of Oxford reported it was a victim of a ransomware attack, which appears to have been initiated by Russian hackers.
By Mike Miliard | 11:35 am | October 04, 2016
The U.S. Department of Health and Human Services will ante $350,000 toward a better system of information sharing about cyber threats across healthcare.
By Bernie Monegain | 11:06 am | October 04, 2016
IBM announced October 3 that it would put Watson to work on IoT, and would devote up $200 million of a $3 billion total investment – the most IBM has ever spent in Europe – to open a new global headquarters in Munich for Watson's IoT business.
By Jessica Davis | 12:23 pm | September 30, 2016
While the ransomware has been active for two years, Netskope researchers say its new strain leverages users syncing and sharing data to spread infected files through the network.
By Jack McCarthy | 08:12 am | September 30, 2016
Consultancy Deloitte explained that the architecture has widespread implications for connecting fragmented systems to better assess the value of care and safeguard protected health information.