Cybersecurity approaches to keep PHI safe

Healthcare organizations have always kept the possibility of data breaches in mind, especially since 2017 witnessed the biggest and most expensive data breach to date. To counter this, more businesses have hired certified technicians, but that’s… Continue reading Cybersecurity approaches to keep PHI safe

MailChimp Fixes Privacy Issue that Leaked Respondents’ Email Addresses

MailChimp has plugged a privacy issue that leaked users’ email addresses when they responded to websites’ newsletter campaigns. Self-proclaimed mobile enthusiast Terence Eden discovered what he calls an “annoying privacy violation&#82… Continue reading MailChimp Fixes Privacy Issue that Leaked Respondents’ Email Addresses

Kaspersky Lab was blocked from joining this U.S.-based cyberthreat information sharing group

A former senior U.S. official blocked Moscow-based cybersecurity firm Kaspersky Lab from joining a prominent trade group made up of U.S.-based cybersecurity companies earlier this year, multiple people with knowledge of the proposed deal tell CyberScoop. When Kaspersky representatives approached the Cyber Threat Alliance (CTA) — a U.S.-based not-for-profit membership organization largely made up of American technology firms who voluntarily share threat intelligence with one another — in early 2017, the group’s leader and former White House Cybersecurity Coordinator Michael Daniel quietly turned the company away, the sources said. “It didn’t really go anywhere because they got Heisman-ed from the get go,” one source described, referencing the college football trophy that represents a player forcefully pushing someone out of their way. Daniel spoke with CyberScoop and acknowledged that Kaspersky had shown interest in joining the CTA. Kaspersky is not currently a member. The choice to exclude Kaspersky alludes to knowledge of […]

The post Kaspersky Lab was blocked from joining this U.S.-based cyberthreat information sharing group appeared first on Cyberscoop.

Continue reading Kaspersky Lab was blocked from joining this U.S.-based cyberthreat information sharing group

Former U.S. spies say anti-virus software makes for a perfect espionage platform

Popular anti-virus software companies are a prime target for intelligence agencies because they have direct, continuous access into their clients’ networks and collect large quantities of data about them, former U.S. intelligence officials and cybersecurity experts say. Although the targeting of anti-virus (AV) companies by government-backed hackers only recently became well-known, experts say sophisticated intelligence agencies have long understood the inherent value of infiltrating these firms to gather information and in some cases, spread malware. “As cybersecurity companies centralize information and maintain access to their customers, securing the cloud-based infrastructure of those cyber companies becomes paramount,” said Ben Johnson, a former NSA computer scientist. “These organizations have become prime targets for intelligence agencies, militaries, and sophisticated cyber organizations looking for ways into corporate and government institutions.” Because most anti-virus vendors have designed their products to autonomously search for computer viruses on users’ systems by directly scanning files and then sending that data back […]

The post Former U.S. spies say anti-virus software makes for a perfect espionage platform appeared first on Cyberscoop.

Continue reading Former U.S. spies say anti-virus software makes for a perfect espionage platform

7 STEPS TO A GRC RISK MANAGEMENT FRAMEWORK—4: EVALUATE RISK TREATMENTS

This week, we continue our journey through the seven steps you can follow to build a risk management framework for information. We’ve already looked at how to identify important information that may be at risk in your organization, where to find the information and how to assess the risk it presents within its business context.…

The post 7 STEPS TO A GRC RISK MANAGEMENT FRAMEWORK—4: EVALUATE RISK TREATMENTS appeared first on Speaking of Security – The RSA Blog.

Continue reading 7 STEPS TO A GRC RISK MANAGEMENT FRAMEWORK—4: EVALUATE RISK TREATMENTS

Resources: Windows 10 Update Related Information and Links

Each new feature update to Windows 10 introduces changes, most of them very slight, to the process of updating Windows 10. The recently released Creators Update has added a few tweaks to the process so here is a collection of resources to help you be… Continue reading Resources: Windows 10 Update Related Information and Links

Wonga Says Incident May Have Compromised Customers’ Personal Data

Payday loan company Wonga has confirmed that a security incident may have affected some of its customers’ personal and financial information. The Britain-based lender says it’s currently working to notify affected customers that the incident may have compromised their names, e-mail addresses, home addresses, phone numbers, the last four digits of their payment card number, […]… Read More

The post Wonga Says Incident May Have Compromised Customers’ Personal Data appeared first on The State of Security.

Continue reading Wonga Says Incident May Have Compromised Customers’ Personal Data

How Twitter Sued the Trump Administration and Won Almost Instantly

Twitter sued Customs and Border Protection on Thursday. By Friday morning, the government withdrew its subpoena for the user information of @ALT_uscis. Continue reading How Twitter Sued the Trump Administration and Won Almost Instantly

How Twitter Sued the Trump Administration and Won Almost Instantly

Twitter sued Customs and Border Protection on Thursday. By Friday morning, the government withdrew its subpoena for the user information of @ALT_uscis. Continue reading How Twitter Sued the Trump Administration and Won Almost Instantly