When a major organization suffers a security breach, it’s no surprise to see the victim’s computer systems in a state of total chaos: incident response teams freezing machines, day-to-day work grinding to a halt, and confusion as to the depth and breadth of the compromise.
On November 20th, Adm. Michael Rogers, Deputy Director of the NSA and head of the US Cyber Command, testified before the House Intelligence Committee that China and “one or two other countries” had the capability to launch cyber attacks on the U.S. that could shut down the electrical grid and other critical infrastructure systems.
With the number of breach victims in 2014 thus far reaching over 77 million, investing in a cyber insurance policy may sound like a good idea.
If protecting the integrity of patient health care information were not already sufficient incentive to improve IT security, being HIPAA compliant has perks.
The real impact of the Internet of things and computing everywhere is still misunderstood. An area that should be of particular concern is security.
The biggest social engineering threat to organizations is not a specific type of scam, but a general lack of employee awareness.
This year may be remembered as the year of the “named” bugs — first Heartbleed, then Shellshock, and now POODLE — another bug surrounding SSL encryption.
Redspin will be participating in several great healthcare and security conferences this September. Make sure you tune in to get useful information about IT security, policy compliance, and penetration testing! Stanford Medicine X (Palo Alto, CA) "Practical Information and Security Risk…
We may be able to send a man to the moon but we still have a long way to go before all of our web applications are sufficiently protected from hackers.
Google's founders, Sergey Brin and Larry Page, were recently asked at a conference if they could imagine Google becoming a healthcare company. They both said "no" and explained their reasoning as follows. Brin felt the regulatory obstacles would "dissuade a…