Blog Archives

Your Employees’ Credentials are on the DarkWeb – Now What?

Your Employees’ User Names & Passwords are Floating Around on The DarkWeb…Now What???

You must protect your assets by avoiding the most common password mistakes to protect your employee information from finding its way to the DarkWeb.

For most of us, the use of internet-based services is a huge part of our everyday lives.

Read more ›

Posted in cyber risk, DarkWeb, Phishing, Vendor Compliance
Tags: , , , ,

Cyberlitica Finds Your Employee Credentials on the DarkWeb – Now What?

Cyberlitica Found Your Employees’ User Names & Passwords Floating Around on The DarkWeb…Now What???

You must protect your assets by avoiding the most common password mistakes to protect your employee information.

For most of us, the use of internet-based services is a huge part of our everyday lives.

Read more ›

Posted in cyber risk, DarkWeb, Phishing, Vendor Compliance
Tags: , , , ,

Cyberlitica – 8 Ways Hackers Monetize Stolen Data

Hackers are craftier than ever, pilfering PII piecemeal so bad actors can combine data to set up schemes to defraud medical practices, steal military secrets and hijack R&D product information.
Create a Repository of the Stolen Data

Hackers start by taking an inventory of what was stolen. They will look through the stolen data files for the victim’s authentication credentials,

Read more ›

Posted in Cybersecurity, Fraud, Hacks
Tags: , , , , ,

Data Theft and the Role of Big Data

How to discover data theft using Hadoop and Big data?

By Kaushik Pal, Techalpine

big-data-talent-searchbig-data-talent-searchData theft has been a big issue for quite some time. What adds to the problem is the long time taken to identify the theft. The longer it takes to detect data theft,

Read more ›

Posted in Big Data, Breach, Content, Data Security, Incident Response, Risk Management
Tags: , , , , , , , ,

Three Mistakes that can Kill Your Small Business

Protect Your Small Business from these Mistakes

August 21, 2015
Whoops. He should have read this article!Whoops. He should have read this article!

No matter what line of work you’re in, constantly expanding upon your knowledge and skills is the best path to reach the next level.

Read more ›

Posted in Compliance, Content, Data Solutions, Incident Response, Layered Defense, Legal, Regulatory
Tags: , , , , , ,

NIST Cannot Endorse Encryption Standard

NIST’s Random Bit Generator Algorithm Fail

The National Institute of Standards and Technology’s job is to produce standards and advance technologies to protect the federal government’s information system’s integrity.

Read more ›

Posted in Compliance, Content, Cybersecurity, Governent Oversight, Government Surveilance, Legal, Oops, Privacy, Regulatory
Tags: , , , , , , , ,

Patient Data Matching: Best Practices

New Collaborative Effort Focuses on Patient Data Safety
By , September 12, 2013. Follow Marianne @HealthInfoSec

6059_branzell_russ_175x1756059_branzell_russ_175x175Federal regulators have launched a collaborative project aimed at improving patient data matching nationally in an effort to bolster patient safety while protecting privacy.

Read more ›

Posted in Compliance, Content, Cybersecurity, HIPAA, Legal, Privacy, Privacy Laws, Regulatory
Tags: , , , , , , , ,

EHRs and Security: Beyond HITECH

Guidance for EHRs Software Used by Those Ineligible for Incentives
By , September 11, 2013. Follow Marianne @HealthInfoSec

Aiming to promote secure health data exchange and interoperability across electronic health records systems, federal regulators have issued guidance for EHR vendors that serve healthcare providers who are ineligible to participate in the HITECH Act EHR incentive program.

Read more ›

Posted in Content, Cybersecurity, Governent Oversight, HIPAA, Legal, Regulatory, Risk Management
Tags: , , , , , , , , , , ,

Encryption: The Next Generation

Research Paves Way for Safer Way to Share Encryption Keys
By , September 9, 2013. Follow Fahmida Y. @ITsecuritytech

While researchers have taken a significant step toward making quantum cryptography more cost-effective, much more research is necessary before organizations can secure their communications using this advanced technology for exchanging encryption keys,

Read more ›

Posted in Content, Cybersecurity, Encryption, Legal, Malware, Privacy
Tags: , , , , , , , , , , ,

Focus Should be Data Security, Not Device Security

As government goes mobile and makes greater use of cloud services, IT leaders must adopt a more data-centric, not device-centric, security approach.

Dave Anderson | August 29, 2013 11:35 AM

In Gartner’s latest quarterly PC sales analysis, it’s hard to miss the enormous shift away from desktop and laptop PCs toward tablets and smartphones.

Read more ›

Posted in Content, Cybersecurity, Insider Threats, Malware, Privacy, Regulatory
Tags: , , , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:

Name:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity

Archives

Recent Tweets

Categories

Follow

Get every new post delivered to your Inbox

Join other followers: