Healthcare Cybersecurity (Part II) - Pernicious Threats and Their Ripple Effects
Cooperation between health professionals and IT staff has never been more important. The ...
The Protocol That's Putting Enterprise IoT At Extreme Risk
A protocol little known by executives outside of the networking world may put the future ...
Two-Thirds of Healthcare Organizations Have Suffered a Security Incident
The healthcare industry is among the most affected by security incidents, and new research ...
IT Leaders Aim to Outgun Hackers with Bigger Cybersecurity Budgets in 2020
More than half of IT professionals are extremely concerned about the security of corporate ...
Bitdefender Researchers Discover New Side-Channel Attack
This new speculative-execution-based attack exploits flaws in the CPU architecture to ...
Passwords Remain the Main Method of Authentication and Top Cause of Data Breaches
The username/password combo is still the dominant method of authentication used to access ...
Healthcare Providers Lose an Average $2.75 Million per Data Breach
More than half of healthcare vendors have suffered at least one breach of protected health ...
Why Is Targeted Ransomware So Dangerous?
The word “ransomware” strikes fear in the hearts of chief technical officers. Their impulse ...
Securing AI: The Next Gen of Enterprise Cybersecurity
Recently, a facial recognition vendor that consolidates billions of photos to fuel its ...
20% of People Caught in Data Breaches Suffer Financial Info Leaks
A wide range of information is lost in a data breach, starting from more innocuous things ...
Survey Shows Most Organizations Plan to Embrace Zero Trust, yet Remain Unconfident in Ability to Implement
One of the biggest weaknesses in any environment is maintaining effective authentication and ...
Cyberattack Fears Haunt State Employees More Than Natural Disasters and Terrorist Attacks
Fewer than one in four city employees receive cyber training related to ransomware threats ...


