Sign up | Login with →


Tactics to Protect Against Most Common Cyber Attacks

February 19, 2016 by Peter Davidson

Cybercrimes in today’s technologically advanced society have become much more sophisticated and progressive. We can thank mobility for the ease of extended access to our personal data, as with every use of our mobile phones, laptops or tablets in public areas we further increase our risk and vulnerability.[read more]

Dynamic Cybersecurity Needs: Reassessing Security

November 30, 2014 by Thu Pham

cybersecurity needs

As a recent report on Defending Data by Nuix found, cybersecurity needs are dynamic - 73 percent of surveyed participants report that their organization’s cybersecurity needs have changed in the past year. Another 69 percent expect their needs to change again within another year.[read more]

Seek and Destroy: U.S. Energy Firms Warned of Recent IT Threats

May 14, 2013 by April Sage

IT threats / shutterstock

The U.S. government released a warning about the increasing risk of cyber attacks targeting critical energy corporations. While the majority of previous attacks have involved stealing trade secrets, the newest threats appear to be motivated by the intention to shut down industrial machinery and energy delivery.[read more]


The Big Data Security Transformation

April 12, 2013 by Marcus Weems

big data security

Today's security systems still have long ways to go before being fully integrated in true Big Data sense. Security professionals need to be able to get increasing value from the data they already collect and analyze, on top of the data they still are not getting. Here are some key considerations.[read more]

HIPAA Breach Lessons Learned

April 3, 2013 by April Sage

While no records were broken when it comes to number of health records disclosed per data breach, the top HIPAA breaches of last year still come with some hard lessons learned about technical and physical security. Protect your healthcare organization from suffering the same fate.[read more]

HIPAA in a HITECH World: HIPAA Violations on the Rise

March 25, 2013 by April Sage

Since the HITECH Act, HIPAA complaint traffic geometrically increased. In the last 3 years, there have been over 70,000 HIPAA violation complaints. It’s impossible to enforce every complaint, and we don’t want to. The approach to enforcement needs to be smart and educational.[read more]

Cybersecurity: Evernote Adds Two-Factor Authentication

March 11, 2013 by April Sage

On Saturday, the online SaaS (software as a service) note-collecting Evernote stated that they had discovered and blocked unauthorized activity on their network. In response to the attack, they reset the passwords of the nearly 50 million people that are currently using their system.[read more]

Predictive Analytics Presents: A Typical Day in 2020

February 26, 2013 by Eric Siegel

Good morning. It's January 2, 2020, the first workday of the year. As you drive to the office, the only thing predictive analytics doesn't do for you is steer the car (yet that's coming soon as well). Check out what the future has in store for you.[read more]

Moving to the Public Cloud? Do the Math First

February 22, 2013 by Paul Barsch

A manufacturing executive claims that many companies “didn’t do the math” in terms of rushing to outsource key functions to outside suppliers. Are companies making the same mistake in terms of rushing to public cloud computing infrastructures?[read more]

Data Breach at Stanford Children's Hospital

February 1, 2013 by April Sage

Image via shutterstock

A laptop was stolen from a Stanford University-affiliated hospital on Jan. 9th. The computer contained medical information and was unencrypted, although password protected. The breach has affected around 57,000 patients from the Lucile Packard Children’s Hospital, as per an announcement this Monday from the hospital.[read more]

Three Healthcare IT Trends for 2013

January 31, 2013 by Connie Bensen

This post takes a look at three key trends in healthcare information technology that Dell is keeping an eye on in 2013, including increased mobility for clinicians, more providers using the cloud, and better employment of Big Data.[read more]

The APPS Act Addresses Mobile Security Concerns

January 30, 2013 by April Sage

The need for data security in an emerging mobile world has policymakers and government agencies doing their best by providing new tools and proposing legislation to keep pace. A few weeks ago, the APPS (Application Privacy, Protection and Security) Act of 2013 was released for discussion to address mobile data security for consumers.[read more]

ACH Fraud Hurts Bank Reputations

January 29, 2013 by April Sage

ACH fraud (Automated Clearing House) and the subsequent loss of funds are a growing problem. Because most businesses hold the bank responsible for the security of their account, the reputation of the financial institution is at stake when attacks like these happen. So, what can both businesses and banks do in order to keep themselves safe?[read more]

DISA Vice Director Discusses Future of Dept. of Defense IT

January 29, 2013 by Ryan Kamauff

On Jan. 24, the Defense Information Systems Agency (DISA) Vice Director discussed the benefits of collocation with NSA and USCYBERCOM at Fort Meade, a look at DoD’s readiness, and focused on the Joint Information Environment, the future of DoD information technology.[read more]

Top Stories in Cybernews

January 29, 2013 by Ryan Kamauff

Rise in DDos attacks and mobile traffic visibility concerns, gets new alpha site, government appetite growing for Twitter user data, Pentagon to boost cybersecurity force, and more top cybernews stories of the day.[read more]