Blog Archives

The First 100 Days – Trump and Cybersecurity

Cybergovernance: 3 Initiatives for the First 100 Days

by | Nov 14, 2016

A new administration’s priorities are often set within its first 100 days. What should the new administration do to help the country achieve greater levels of cyber maturity and risk mitigation?

Read more ›

Posted in Cyberattack, Cybersecurity, Encryption, Governance, Legal, Privacy, ransomware, Regulatory, Risk Management
Tags: , , , , , , , , , , ,

Encryption Isn’t Going Away

Encryption App Gains Popularity Amid Apple Privacy Battle

By Steve Rosenbush for WSJ

The battle between Apple Inc. and the FBI over an encrypted iPhone used by one of the San Bernardino terrorists could be meaningful to that particular investigation. Perhaps, if the FBI wins, and Apple unencrypts the phone,

Read more ›

Posted in Content, Cybersecurity, Encryption, Governance, Governent Oversight, Government Surveilance, ID Theft, Layered Defense, Legal, Regulatory, spyware
Tags: , , , , , , , , , , ,

The Hackers Who Grinched Christmas

Kids’ smart toys are big holiday targets for hackers

 by: Mark Pribish, VP / ID Theft Practice Leader – MIS, Inc.

Read more ›

Posted in Compliance, Content, Cybersecurity, Encryption, Hacks, Malware, Risk Management
Tags: , , , , , , , ,

Lost Devices Can Lead to Breaches

Lost electronic devices can lead to data breaches

by Mark Pribish for Merchants Information Solutions, Inc.
lost_deviceslost_devicesNearly half of all data breaches occur when ID-theft criminals access information because someone lost a device.
In fact, 41 percent of all data breach events from 2005 through 2015 were caused by lost devices such as laptops,

Read more ›

Posted in Breach, Compliance, Content, Encryption, Fraud, Incident Response, Insider Threats, Mobile, Risk Management
Tags: , , , , , , , , ,

Ashley Madison and the Insider Threat

Was the Insider Threat the Key to the Ashley Madison Breach?

Based on an article by Steve Rosenbush – WSJ

Now that personal information stolen from affair-seeking users of AshleyMadison.com has been posted on the dark Web, it’s a good time to extract some lessons from the episode.

Read more ›

Posted in Breach, Compliance, Content, Cybersecurity, Encryption, Hacks, Incident Response, Insider Threats, Phishing, Risk Management
Tags: , , , , , ,

Why Cyberfy Beats the Competition

Cyberfy: The Future of Smart Phone ID Authentication

by: Yona Fink, CEO Cyberfy

The field is quickly filling up with biometric ID authentication apps, but Cyberfy still holds a lead. Why?

Apple’s Touch ID and EyeVerify (both of which I know,

Read more ›

Posted in Content, Cybersecurity, Encryption, Fraud, Layered Defense, Legal, Mobile, Risk Management
Tags: , , , , , , , ,

Encryption Layers Demystified

Cracking the Confusion: Encryption Layers

by Adrian Lane for Securosis

Encryption Layers

Picture your enterprise applications as a layer cake; applications sit atop databases, databases atop files, and files mapped onto storage volumes. You can use encryption at each of these layers in your application stack;

Read more ›

Posted in Compliance, Content, Cybersecurity, Encryption, Hacks, Incident Response, Privacy, Risk Management, Vendor Compliance
Tags: , , , , , , , , ,

Protecting Against Anthem-Like Attacks

Experts Offer 9 Tips for Minimizing Risk of Anthem-Like Hacker Intrusions

Protecting Against Anthem-Like AttacksProtecting Against Anthem-Like Attacks

By , February 10, 2015 for HealthCareInfoSec

In the aftermath of the massive data breach at Anthem Inc.,

Read more ›

Posted in Compliance, Cyberattack, Cybersecurity, Encryption, Hacks, HIPAA, Incident Response, Insider Threats, Malware, Malware & Other Threats, Phishing, Regulatory, Risk Management, Vendor Compliance
Tags: , , , , , , , , , , , , , ,

Healthcare and the Role of Cybersecurity

Cybersecurity: Healthcare Organizations Can Learn from Mistakes

Suhail Nanji – Director, Eastern Region SMLR Group, Inc.

Healthcare entities have a lot at stake when it comes to cybersecurity. Sensitive patient data released into the public sphere puts everyone on edge.

Read more ›

Posted in Content, Cybersecurity, Encryption, Governent Oversight, Hacks, HIPAA, Incident Response, Insider Threats, Malware, Malware & Other Threats, Privacy, Privacy Laws, Regulatory, Risk Management, Vendor Compliance
Tags: , , , , , , , , , , ,

Beth Israel Deaconess Fined for Breach

Breach: Stolen Physician’s Laptop Contained Unencrypted Patient Data
By , November 21, 2014. Follow Marianne @HealthInfoSec

The Massachusetts Attorney General has fined Beth Israel Deaconess Medical Center in Boston $100,000 as a result of a 2012 breach involving a stolen unencrypted laptop.

Read more ›

Posted in Breach, Encryption, Governent Oversight, HIPAA, Incident Response, Legal, Risk Management, Vendor Compliance
Tags: , , , , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:

Name:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity

Archives

Recent Tweets

Categories

Follow

Get every new post delivered to your Inbox

Join other followers: