As a recent report on Defending Data by Nuix found, cybersecurity needs are dynamic - 73 percent of surveyed participants report that their organization’s cybersecurity needs have changed in the past year. Another 69 percent expect their needs to change again within another year.[read more]
IT threats / shutterstock
The U.S. government released a warning about the increasing risk of cyber attacks targeting critical energy corporations. While the majority of previous attacks have involved stealing trade secrets, the newest threats appear to be motivated by the intention to shut down industrial machinery and energy delivery.[read more]
Today's security systems still have long ways to go before being fully integrated in true Big Data sense. Security professionals need to be able to get increasing value from the data they already collect and analyze, on top of the data they still are not getting. Here are some key considerations.[read more]
While no records were broken when it comes to number of health records disclosed per data breach, the top HIPAA breaches of last year still come with some hard lessons learned about technical and physical security. Protect your healthcare organization from suffering the same fate.[read more]
Since the HITECH Act, HIPAA complaint traffic geometrically increased. In the last 3 years, there have been over 70,000 HIPAA violation complaints. It’s impossible to enforce every complaint, and we don’t want to. The approach to enforcement needs to be smart and educational.[read more]
On Saturday, the online SaaS (software as a service) note-collecting Evernote stated that they had discovered and blocked unauthorized activity on their network. In response to the attack, they reset the passwords of the nearly 50 million people that are currently using their system.[read more]
A laptop was stolen from a Stanford University-affiliated hospital on Jan. 9th. The computer contained medical information and was unencrypted, although password protected. The breach has affected around 57,000 patients from the Lucile Packard Children’s Hospital, as per an announcement this Monday from the hospital.[read more]
The need for data security in an emerging mobile world has policymakers and government agencies doing their best by providing new tools and proposing legislation to keep pace. A few weeks ago, the APPS (Application Privacy, Protection and Security) Act of 2013 was released for discussion to address mobile data security for consumers.[read more]
ACH fraud (Automated Clearing House) and the subsequent loss of funds are a growing problem. Because most businesses hold the bank responsible for the security of their account, the reputation of the financial institution is at stake when attacks like these happen. So, what can both businesses and banks do in order to keep themselves safe?[read more]
On Jan. 24, the Defense Information Systems Agency (DISA) Vice Director discussed the benefits of collocation with NSA and USCYBERCOM at Fort Meade, a look at DoD’s readiness, and focused on the Joint Information Environment, the future of DoD information technology.[read more]
The purpose of Data Privacy Day is to empower people to protect their privacy and escalate the protection of privacy and data. The first step to empowerment is knowledge. Therefore, I have put together a number of personal privacy, mobile security and HIPAA & PCI compliance resources for businesses.[read more]
The moderated business community for business intelligence, predictive analytics, and data professionals.
|How do you innovate effectively and maintain a competive edge?|
Learn how in our exlcusive ebook, "Bad Data Need Not Apply: Designing the Modern Data Warehouse Environment."