Cybersecurity

The following is the body of an email from Intel®, regarding findings of their security research--related to widely-publicized exploits that have created issues with computer chipsets, operating systems and other technologies. The content is reproduced in entirety with attribution, and contains helpful resources for further information about the vulnerabilities, and regarding proactive measures that can be taken to protect business systems.

---------

Continue Reading

CRN reported yesterday (December 14), in the revealing article entitled, "FBI Cybersecurity Expert Abagnale: Equifax 'Sloppiness' Caused Massive Breach", by authors Steven Burke and Michael Novinson: "Frank Abagnale, an FBI cybersecurity specialist and identity fraud expert, told CRN that the massive breach at credit reporting

Continue Reading

An article in the December 5, 2017, edition of Becker's Healthcare ("Becker's Health IT and CIO Review"), by author, Julie Spitzer, was entitled, "10 biggest malware campaigns & high-profile cyberattacks of 2017".

Continue Reading

A breaking article in today's (November 6, 2017) edition of Modern Healthcare, by staff writer, Rachel Z. Arndt, is entitled, "Cybersecurity threats pose biggest healthcare hazard, ECRI reports". Arndt states in the article that, "according to a new report from the ECRI Institute...

Continue Reading

An article by author, Jessica Davis, of HIMSS Media, in yesterday's (9/5/2017) edition of Healthcare IT News, entitled, "Hackers are ransoming 26,000 unsecured MongoDB databases, security researchers find", alerts readers about specific ransomware attacks throughout the end of last year "into early 2017".

Continue Reading

An article by leading security technology journalist, Doug Drinkwater, entitled, "10 steps for a successful incident response plan", appeared in June, on the CSO (by IDG) website.

Continue Reading

An important article by author, India Ashok, entitled, "New Defray ransomware demands $5,000 from US and UK victims in highly customised attacks", appeared on August 26, on the International Business Times website. It identified a form of ransomware that, according to Ashok, "is using highly customised phishing emails to go after specific targets.

Continue Reading

An article by Rachel Z.

Continue Reading

A post today from Krishna Kurapati, CEO of qliqSOFT, Inc., a HIPAA-compliant healthcare messaging application company, is entitled, “Petya” Ransomware Attack: What You Need to Know." In the post, Kurapati describes that, "For the second time in two months, a major ransomware attack has had international implications.

Continue Reading

Hewlett Packard Enterprise (HPE) Security shared a June 2017 report from James Scott, Sr. Fellow, The Institute for Critical Infrastructure Technology (ICIT), entitled "The Necessity of Encryption for Preserving Critical Infrastructure Integrity." This powerful report states the following: "Lately, consumers have not been able to trust public or private entities to secure their data.

Continue Reading

Pages

Subscribe to RSS - Cybersecurity