Health data, contractors and cloud form another perfect storm
Health records and disability claim forms for more than a million residents in states like Kansas and Utah local governments washed up on Amazon’s cloud – the latest example of the combustible mix of health data, third party contractors and cloud based applications.
Framing Third Party Risk: The PNI Photo Hack
The attack on an obscure photo printing vendor underscores the risk that third parties pose in the age of outsourcing.
Data Breaches and the Damage Done: New Ruling Grants FTC Regulatory Authority for Cybersecurity
The Third Circuit's recent ruling sets a new precedent for the FTC's ability to regulate data breaches and other cybersecurity incidents. What does this mean for the security industry?
Email Blunder Exposes Identity of 780 HIV Patients in the UK
Healthcare organizations face a myriad of security threats. But the news this week about a UK clinic exposing the identities of 780 HIV positive patients was a purely self-inflicted wound.
What is the True Cost of a Data Breach? It May Not Be that Easy
As data breaches big and small continue to flood headlines, measuring the cost of these incidents remains a challenge.
Is Ashley Madison Membership Really Still Growing?
The company’s latest statement claims that hundreds of thousands of new users to continue to sign up each week. Are these numbers valid?
A Timeline of the Ashley Madison Hack
Track and follow the Ashley Madison hack with our continuously updated timeline.
On The Internet, Everyone Knows You’re A Dog
The release of gigabytes of data from extramarital hookup site Ashley Madison underscores the death of online anonymity – and the dangers of unchecked data collection and storage by online merchants.
DDoS As a Cover for Data Theft
Distributed denial of service attacks are IT teams' worst nightmare - but they may be the least of your problems, experts say.
Carphone Warehouse Compromised
Carphone Warehouse, a British cellphone company, fell victim to a comprehensive hack discovered on Wednesday, August 5th.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!