Privacy & Security

cybersecurity threats
By Dan Costantino 09:08 am February 19, 2018
After all the cybersecurity threats and events in the last 12 months, infosec teams should focus on these priorities as the craft strategies into the future.

A demonstration of the Spectre attack on a vulnerable machine (a Linux virtual machine running on a Windows 7 platform) took a few seconds to execute.

By Lee Kim 11:18 am January 05, 2018
Affected systems include Windows, Linux, Android, Chrome, iOS and MacOS but the good news is there is a public exploit code to test your system for vulnerabilities.
2017 Cybersecurity Developments
By Lee Kim 11:38 am December 29, 2017
The healthcare sector is improving its cybersecurity practices but as a whole, much more needs to be done.
anti-phishing efforts in healthcare
By Barry Herrin 10:52 am October 12, 2017
Since before 2013, hospitals and other healthcare facilities knew that falls were a serious problem, and massive resources were marshalled to reduce or prevent patient falls.
By James Socas 12:08 pm December 21, 2015
The scale and intensity of healthcare related cybercrime is a critical and growing threat to the U.S. medical system. If data breaches were a virus, we'd call this a pandemic.
By John Halamka 02:07 pm December 09, 2015
2015 has been filled with denial of service attacks, hard-to-detect malware, and a skyrocketing number of personal internet connected devices at the same time that HIPAA enforcement has expanded.
Windows 10
By Vinil Menon 10:40 am December 07, 2015
Windows 10, which Microsoft is positioning as an 'Operating System as a Service' model, offers several innovative new features that will be useful to healthcare users. Here are some things to know for a successful enterprise-wide migration.
By Chris Bowen 03:29 pm November 30, 2015
It's not exactly a secret that there's a worldwide shortage of experienced cyber security professionals. At least one widely-cited report has put the figure at over a million unfulfilled positions.
By Rick Kam 09:49 am November 16, 2015
While cyber-attackers are becoming ever sophisticated at stealing information from business systems, gaining entry into those systems is relatively easy because employees, vendors and sometimes customers are not very sophisticated at keeping them secure.
By Chris Bowen 10:09 am November 13, 2015
The Ashley Madison hack should raise two immediate questions for organizations everywhere: Do they house sensitive and potentially embarrassing data? If so, is it adequately protected from both internal and external threats?

Most Read

The Daily Brief Newsletter