Digital Fingerprints: What You Need to Know

Whether you know it or not, you’ve left your impact on the Web. Every day, computers are becoming more and more skilled at detecting the difference between legitimate and illegitimate users, and it all relies on a digital fingerprint—a form of data that organizations use to identify fraudulent behavior. But as these systems evolve, so […]

Health IT Vendor Faces $145 Million Settlement

If you’re reading this, hopefully you can say that your organization is compliant with HIPAA, the national standards set in place to protect medical records and personal health information. If you’ve taken sufficient steps to prevent fraud and abuse in Medicare, you should be adhering to the Anti-Kickback Statute, and no initiative to implement electronic […]

Addressing Federal Cybersecurity Shortcomings

Nowadays, the biggest stories about cybersecurity breaches tend to concern major companies like Facebook, Marriott, and Capital One. But what you may not realize is that now more than ever, government agencies are a popular target for crippling cyber attacks. According to the U.S. Conference of Mayors, more than 170 government systems have suffered the […]

Educating the Future of Cybersecurity

As cyber attackers evolve with the times, so too will those who fight back—and as one summer camp knows, it all starts with the next generation. This year, with money from a recently awarded National Science Foundation and National Security Agency grant, Harford Community College in Maryland launched its GenCyber Smart Camp for middle schoolers. […]

The Latest and Strangest Security Risk

Last week, we discussed endpoint protection for mobile devices, and how cybersecurity threats tend to crop up in the most unexpected places. Now, based on an August report, we know that you may be overlooking another mundane but crucial vulnerability in your organization: the office printer. A Saturday panel at DEF CON, the hacking convention […]

Securing Mobility in Medicine

The healthcare industry is taking on mobility to modernize for the digital age, but with this step forward comes a host of vulnerabilities and threat vectors determined to set you several steps back. Providers with a plan to evolve their mobile strategy need to be prepared to address the cybersecurity risks that come with it. […]

Teams Face Off in Cybersecurity Simulation

Cyber attacks tend to target the places you least expect. But cybersecurity professionals across the country are dedicated to preparing for any and all points of vulnerability, as evidenced by the latest version of the annual weeklong test “Cyber Flag.” As a tactical exercise series for U.S. Cyber Command, Cyber Flag simulates a conflict between […]

Tallying Healthcare Breaches

Despite leaps and bounds in cybersecurity tech, healthcare continues to be one of the most at-risk industries in the business sector. All one has to do is look at the “wall of shame,” the Department of Health and Human Services’ HIPAA Breach Reporting Tool website. Several large incidents have been added in the past few […]

Understanding Capital One’s Cybersecurity Crisis Response

Major security breaches tend to make the news for all the problems caused by the attack—but what about what we can learn from the solutions? In March, a data breach to Capital One servers exposed the personal information of nearly 106 million customers and applicants. The breach included about 140,000 Social Security numbers and 80,000 […]

Making Cybersecurity a Team Effort

When it comes to setting new standards in the world of cybersecurity, teamwork has proven itself to be invaluable. From private companies to foreign allies, U.S. lawmakers are pushing for cooperation in creating decisive policies to address some of cybersecurity’s biggest dilemmas, including baseline standards for connected devices, 5G, and incident response. Jason Boswell, head […]