This edition of the ISMG Security Report takes a look at how ready healthcare organizations are for GDPR compliance. Also featured: comments from Alberto Yepez of Trident Capital on the 2018 outlook for information security companies and a summary of the latest financial fraud trends.
Mobile phone retailer Carphone Warehouse has been hit with one of the largest fines ever imposed by Britain's data privacy watchdog after an attacker breached its outdated WordPress installation, exposing 3 million customers' and 1,000 employees' personal details.
One of the most alarming breaches of 2015, involving Hong Kong toymaker VTech, has resulted in a $650,000 settlement with the U.S. Federal Trade Commission. It's a warning that internet of things security shortcomings - especially involving children's personal data - will have business consequences.
The U.S. Department of Homeland Security says nearly 250,000 federal employees' personal details were exposed in a 2014 breach of its Office of Inspector General's case management system. Witness testimony and an unknown number of nonemployees' personal details also were exposed.
Information security truisms: 2017 was the year of more cybersecurity - more attacks, more spending, more defenses, more breaches - and 2018 will see more of everything "cyber," plus GDPR enforcement, proxy wars online and more.
New York-Presbyterian has more than 72,000 medical devices from over 1,400 manufacturers, says CISO Jennings Aske. Given that scale, how can a security leader help ensure device cybersecurity? Aske shares his view of what's needed from manufacturers and the government.
The U.S. Food and Drug Administration issued cybersecurity expectations for manufacturers of medical devices. But ow are those expectations being met, and what is the FDA's ongoing role in improving device security? The FDA's Suzanne Schwartz offers an update.
Fraudsters recently ordered a total of nine iPhones and Samsung S8s from Sprint and Verizon with my personal details. With the internet awash in stolen personally identifiable information, are mobile operators doing enough to prevent fraudulent orders?
It's been seven years since Dale Nordenberg, a pediatrician, became involved in the drive to improve medical device security. What progress does he see among manufacturers, government agencies and healthcare providers?
When it comes to privacy, India faces many challenges, including the need to reduce the amount of time it takes to resolve privacy-related cases, says Vicky Shah, advocate, cyber law and data protection.
A 10-member government-appointed committee in India has drafted a white paper that includes recommendations for components of a new data protection law. The government is seeking feedback on the report through Dec. 31.
Traditional identity and access management (IAM) controls, though extensive, are static. Once a malicious user gains access, they are free to exploit the system up to the extent of the account's set privileges.
Download this whitepaper and learn how an identity-centric approach to security solves this problem...
RBI's recent move to mandate that all banks must use Aadhaar as the primary form of authentication for anyone accessing their bank account is stirring a debate about the long-term role of the authentication mechanism and associated data security issues.
Join this webinar to learn about the new Directive on Payment Services (PSD2), and the impact it has on European banks and financial service providers. This new regulation is expected to change the way we interact and consume digital banking.
Are you going to check the box? Or are you going to leverage the...