Huge Development In Cyber Espionage Tech

The United States has reportedly managed to develop a method that allows it to permanently embed surveillance and malware tools in computers and networks around the world, according to Kaspersky Lab, a Russian cybersecurity firm. Kaspersky presented its research at a conference in Mexico Monday night. They have dubbed the creators of this technique the […]

PCI DSS 3.0: Are You In Compliance Yet?

The new Payment Card Industry Data Security Standard 3.0 (PCI DSS 3.0) that went into effect on January 1 contains significant changes.  Some of the requirements will remain suggested best practices until July 1, 2015. After that, they too become mandatory. PCI 3.0 will have the greatest impact on e-commerce merchants who partner with third […]

What You Need To Know About Car Hacking

That snazzy new car may be looking a little less appealing right now, following this week’s 60 Minutes show on car hacking, teamed with a Senator’s report detailing how wireless technologies in new cars can be exploited by both criminals and marketing mavens. Bottom line: the chances of your car being hacked, right now and […]

A Benchmark For Managing Conduct Risk

Regulators are increasingly interested in how financial firms are managing conduct risk. Thomson Reuters’ second annual survey on conduct risk identifies the most important industry-wide trends, and is based on a global survey of more than 200 compliance and risk practitioners from financial services firms. The report can act as a framework against which firms […]

Securing Billions of Smart Things

There are roughly 25 billion smart devices and objects busily gathering data and beaming information back to their respective motherships (and business partners).  That’s up from 7 billion things a mere five years ago. And five years from now? The consensus is 50 billion things will be interconnected, merrily gathering data, and making our lives […]

Has Sloppy Security Slipped Into Your Network Ecosystem?

Much has been said about Sony, and much remains to be said. But the bottom line is that Sony was a cyber attack that was simply waiting to happen. This is a company that has been repeatedly hit by malicious hackers who, angered by Sony’s approach to Digital Rights Management, were determined to wreck havoc […]

Does Your Organization Need Cyber Insurance?

News about the damage associated with the Sony breach keep coming, and is most likely going to reach new heights over the Christmas break. Meanwhile, criminals keep conducting immensely successful hack attacks against huge brands that should have the financial assets and talent to protect against breaches. Has this risk management gone very wrong — […]

The New Federal Strategic Health IT Plan

The Office of the National Coordinator for Health IT, a unit of the Department of Health and Human Services, has issued its Strategic Health IT Plan for 2015 to 2020. The plan, developed in collaboration with more than 35 federal agencies, has five main goals: Furthering the adoption of health IT Improving the security and […]

Free Security Awareness Training for Financial Industry Executives

Security awareness will be a focus for banking regulators in 2015, with a focus on financial institutions’ C-suite executives and boards of directors. It’s likely that an in-depth refresher program will be a must for many, as new regulations are more complex and put a strong emphasis on cybersecurity preparedness. One resource that financial institutions […]

HIPAA, Health Technology Trends, and Security Threats

Most people in the U.S. say that care more about protecting the privacy of their healthcare data than they do about being able to conveniently access that information. That said, according to a recent PwC Health Research Institute report, privacy will be sacrificed to apps/services that collect and analyze personal health information. Do-it-yourself healthcare is […]