So, what can we expect next year? Privacy expert Rebecca Herold offers her predictions for the 11 most significant healthcare information security and privacy events that will occur throughout 2018.
Fraudsters recently ordered a total of nine iPhones and Samsung S8s from Sprint and Verizon with my personal details. With the internet awash in stolen personally identifiable information, are mobile operators doing enough to prevent fraudulent orders?
The desire to gain a competitive edge is beginning to drive security investments among companies in the region, says Nigel Ng, vice president, Asia Pacific and Japan, for RSA.
The international payments system is largely based on the three-decades old SWIFT messaging system. But cyberattackers have exploited weak controls employed by banks to make fraudulent transfers. Nick Armstrong of Identitii discusses a path forward for securing payments made with legacy systems.
Curt Kwak, CIO of Proliance Surgeons, a large Washington state surgery practice, discusses top security challenges and priorities for the new year in this in-depth interview.
Exploring Samuel Visner's vision - patterned after the Manhattan Project and moonshot - for collaborating to create innovative ways to improve cybersecurity leads the latest edition of the ISMG Security Report. Also featured: a report on legislation designed to improve the security of U.S. elections.
It's been seven years since Dale Nordenberg, a pediatrician, became involved in the drive to improve medical device security. What progress does he see among manufacturers, government agencies and healthcare providers?
Two London-based Romanians recently arrested in Bucharest as part of a roundup of alleged ransomware attackers have been accused of hacking into Washington surveillance cameras and using them as a launchpad for Cerber and Dharma ransomware attacks.
Organizations need to have a clearly defined process in place to investigate security incidents before they report them to law enforcement authorities, says Ankur Kushalka of Atos, a European IT firm.
The Trump administration has belatedly announced that hackers tied to the government of North Korea were behind the WannaCry ransomware outbreak that began in May and infected more than 200,000 endpoints across 150 countries. Why is the White House only now airing its attribution?
An analysis of the cyber component of the Trump administration's just-published National Security Strategy leads the latest edition of the ISMG Security. Also, DHS and industry establish a cyber coordinating council to help secure the U.S. electoral system.
Legislation pending in Congress that would offer protections for companies and individuals who seek to "hack back" in retaliation against cybercriminals who have attacked them is a bad idea, contends Alan Brill of Kroll.
The latest ISMG Security Report leads with a report on a malware attack on an industrial safety system that experts contend could threaten public safety. Also, legislation giving DHS's cybersecurity unit a meaningful name progresses through Congress.
With just a few months left until the EU's General Data Protection Regulation will be enforced, too many so-called "experts" are spreading fear and falsehoods about the regulation, says Brian Honan, a Dublin-based cybersecurity consultant, who clarifies misperceptions in an in-depth interview.
Most of the criminal activity targeting today's enterprises originates at the endpoint, and the majority of modern breaches use known threats or vulnerabilities for which a patch already exists. For this reason, endpoint visibility must be complete and continuous.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.