Sign up | Login with →

cybersecurity

Seek and Destroy: U.S. Energy Firms Warned of Recent IT Threats

May 14, 2013 by April Sage

IT threats / shutterstock

The U.S. government released a warning about the increasing risk of cyber attacks targeting critical energy corporations. While the majority of previous attacks have involved stealing trade secrets, the newest threats appear to be motivated by the intention to shut down industrial machinery and energy delivery.[read more]

exclusive

The Big Data Security Transformation

April 12, 2013 by Marcus Weems
1

big data security

Today's security systems still have long ways to go before being fully integrated in true Big Data sense. Security professionals need to be able to get increasing value from the data they already collect and analyze, on top of the data they still are not getting. Here are some key considerations.[read more]

HIPAA Breach Lessons Learned

April 3, 2013 by April Sage

While no records were broken when it comes to number of health records disclosed per data breach, the top HIPAA breaches of last year still come with some hard lessons learned about technical and physical security. Protect your healthcare organization from suffering the same fate.[read more]

HIPAA in a HITECH World: HIPAA Violations on the Rise

March 25, 2013 by April Sage

Since the HITECH Act, HIPAA complaint traffic geometrically increased. In the last 3 years, there have been over 70,000 HIPAA violation complaints. It’s impossible to enforce every complaint, and we don’t want to. The approach to enforcement needs to be smart and educational.[read more]

Cybersecurity: Evernote Adds Two-Factor Authentication

March 11, 2013 by April Sage

On Saturday, the online SaaS (software as a service) note-collecting Evernote stated that they had discovered and blocked unauthorized activity on their network. In response to the attack, they reset the passwords of the nearly 50 million people that are currently using their system.[read more]

Predictive Analytics Presents: A Typical Day in 2020

February 26, 2013 by Eric Siegel

Good morning. It's January 2, 2020, the first workday of the year. As you drive to the office, the only thing predictive analytics doesn't do for you is steer the car (yet that's coming soon as well). Check out what the future has in store for you.[read more]

Moving to the Public Cloud? Do the Math First

February 22, 2013 by Paul Barsch

A manufacturing executive claims that many companies “didn’t do the math” in terms of rushing to outsource key functions to outside suppliers. Are companies making the same mistake in terms of rushing to public cloud computing infrastructures?[read more]

Data Breach at Stanford Children's Hospital

February 1, 2013 by April Sage

Image via shutterstock

A laptop was stolen from a Stanford University-affiliated hospital on Jan. 9th. The computer contained medical information and was unencrypted, although password protected. The breach has affected around 57,000 patients from the Lucile Packard Children’s Hospital, as per an announcement this Monday from the hospital.[read more]

Three Healthcare IT Trends for 2013

January 31, 2013 by Connie Bensen

This post takes a look at three key trends in healthcare information technology that Dell is keeping an eye on in 2013, including increased mobility for clinicians, more providers using the cloud, and better employment of Big Data.[read more]

The APPS Act Addresses Mobile Security Concerns

January 30, 2013 by April Sage

The need for data security in an emerging mobile world has policymakers and government agencies doing their best by providing new tools and proposing legislation to keep pace. A few weeks ago, the APPS (Application Privacy, Protection and Security) Act of 2013 was released for discussion to address mobile data security for consumers.[read more]

ACH Fraud Hurts Bank Reputations

January 29, 2013 by April Sage

ACH fraud (Automated Clearing House) and the subsequent loss of funds are a growing problem. Because most businesses hold the bank responsible for the security of their account, the reputation of the financial institution is at stake when attacks like these happen. So, what can both businesses and banks do in order to keep themselves safe?[read more]

DISA Vice Director Discusses Future of Dept. of Defense IT

January 29, 2013 by Ryan Kamauff

On Jan. 24, the Defense Information Systems Agency (DISA) Vice Director discussed the benefits of collocation with NSA and USCYBERCOM at Fort Meade, a look at DoD’s readiness, and focused on the Joint Information Environment, the future of DoD information technology.[read more]

Top Stories in Cybernews

January 29, 2013 by Ryan Kamauff

Rise in DDos attacks and mobile traffic visibility concerns, Data.gov gets new alpha site, government appetite growing for Twitter user data, Pentagon to boost cybersecurity force, and more top cybernews stories of the day.[read more]

Resources to Protect Personal Privacy and Mobile Security

January 29, 2013 by April Sage

The purpose of Data Privacy Day is to empower people to protect their privacy and escalate the protection of privacy and data. The first step to empowerment is knowledge. Therefore, I have put together a number of personal privacy, mobile security and HIPAA & PCI compliance resources for businesses.[read more]

Global Mobile Trends See Rise in BYOD -- and Security Concerns

January 28, 2013 by April Sage
2

89% of IT leaders from enterprise and mid-sized companies support BYOD (Bring Your Own Device) in some form – supporting the movement toward an increase in personal device use in the workplace.[read more]

 

type != 'infographic') ) { ?>