The chief operating officer of an Atlanta-based cybersecurity firm has pleaded guilty and agreed to pay restitution of more than $818,000 in a federal criminal case in which he admitted hacking a Georgia medical center in 2018 in an effort to drum up business for his company.
Federal regulators issued new guidance materials for HIPAA-regulated entities, including a document stressing the importance of sanction policies for workforce members who violate HIPAA, plus two new resources for healthcare providers and patients regarding telehealth privacy and security risks.
A human cyber risk factor increases or decreases the chance of a person becoming a victim of a cyber attack.
Many organizations are moving too slowly towards addressing the human risk elements of security. At the heart of this lies an misunderstanding of human risk factors - with many believing the only...
Being an independent firm under TPG's ownership will allow Forcepoint G2CI to invest in defense-grade cyber tools such as insider threats and content disarm and reconstruction. Separating Forcepoint's government security practice will allow it to focus on secure remote access to classified networks.
Executives and board members always want the answer to be “yes,” but CISOs know it’s irresponsible to make such a blanket statement. An adversary could be any potential threat — whether external or internal, intentional or unintentional. So, the question CISOs should be answering is: “Are we...
Insider threats continue to pose significant concerns in today's digital landscape. While malicious insiders have garnered attention due to harmful intent, negligent users often make unintentional mistakes, contributing to potential cybersecurity risks.
In the span of just a year, from 2019 to 2020, the aviation industry witnessed an alarming surge — a staggering 530% increase in cybersecurity incidents. Of these incidents, a glaring 61% took aim at airlines in the year 2020 alone. This isn’t just a statistic; it’s a resounding wake-up call that resonates with...
Finite resources and the continual urgency to prioritize alerts and make effective decisions puts many security teams under increasing pressure. One wrong decision at a strategic or operational level can impact the business with costly consequences.
Download this guide to learn how to:
Provide meaningful context to...
Human Factor Security expert Robin Lennon Bylenga advised that in building an internal threat management program, it is imperative to not send mixed messages to the broader workforce. It's wise to conduct an assessment of human risk - not just IT risk, she said.
Malicious insiders and compromised credentials are threats that often go undetected by traditional security tools. User and entity behavior analytics (UEBA) analyzes behavior in organizations’ environments to set a baseline for normal and detect anomalies that indicate real threats in need of investigating.
This...
Do you know what the biggest threat is to your organization? The answer may surprise you. It’s your own employees, contractors, and other insiders. These trusted insiders have authorized access to sensitive information and can cause significant harm to your organization, whether they mean to or not. Insider threats...
Watch this 30-minute webinar to explore some of the headline-grabbing incidents that illustrate the rapidly increasing problem of data loss and insider threats. You’ll gain valuable insights into best practices for managing insider threats and risks to your organization.
Legacy DLP is broken due to excess complexity, extended time to value and misalignment with security and business goals, said Next's Chris Denbigh-White. Addressing insider threats in a meaningful way is one of the biggest data protection challenges for organizations, he said.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.