Quarter of Healthcare Apps Contain High Severity Bugs

Quarter of Healthcare Apps Contain High Severity Bugs

A quarter (25%) of healthcare apps contain high severity flaws, but healthcare organizations (HCOs) are relatively quick to fix them, according to new data from Veracode. The security vendor broke out sector-specific data collected for its State of Software Security report and claimed that three-quarters (75%) of healthcare applications contained some kind of vulnerability. This is about on par with the cross-sector average, which stands at 76%. The sector fixes 70% of the flaws it…

Read More

How to protect your brand from rogue actors

How to protect your brand from rogue actors

Many people were cheering for the Kansas City Chiefs during Super Bowl LV. Not because they were Chiefs fans, and not because they didn’t like the Tampa Bay Buccaneers. They wanted KC to win because they wanted, more than anything else, for Tom Brady to lose. Probably more than any other modern-day athlete, people despise Tom Brady (a quick Google search will show you just how much). In the days leading up to the Super…

Read More

Universal Health Services Estimates $67 Million in Ransomware Losses

Universal Health Services Estimates  Million in Ransomware Losses

A ransomware attack on Universal Health Services (UHS) last autumn cost the company an estimated $67 million in downtime and related expenses, it has revealed. The Fortune 500 healthcare organization has tens of thousands of employees in the US and UK and annual revenues exceeding $10 billion. However, it fell victim to a Ryuk attack at the end of September 2020 which forced the firm to pull the plug on key systems in the US….

Read More

Delivering an effective emergency operations center

Delivering an effective emergency operations center

Delivering an effective emergency operations center | 2021-03-02 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

What modern cybersecurity can learn from ancient adversaries

What modern cybersecurity can learn from ancient adversaries

What modern cybersecurity can learn from ancient adversaries | 2021-03-02 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Cybersecurity Challenges: The What, How and When of Change

Cybersecurity Challenges: The What, How and When of Change

I subscribe to a newsletter from Gary Burnison, CEO of Korn Ferry. His messages address a wide variety of career and personal issues in a thoughtful and educational manner. A recent Special Edition message was titled Exceeding Potential. It specifically addressed how opportunities present themselves and how to view and leverage them. He closed his message with this statement: It’s true that leaders are in the “what,” “how,” and the “when” business. But, ultimately, we…

Read More

Risks & Responses to Cloud-Based Storage Misconfigurations

Risks & Responses to Cloud-Based Storage Misconfigurations

Misconfigurations remain one of the most common risks in the technology world. Simply telling organisations to “fix” this problem, however, is not as easy as it might first seem because there’s a myriad of technologies at play in modern infrastructure deployments. All of this results in a complicated mix of hardening approaches for each system. What is key, then, is to identify where hardening is required and then consider the methodology for each area. Even…

Read More

T-Mobile customers were hit with SIM swapping attacks

T-Mobile customers were hit with SIM swapping attacks

The telecommunications giant T-Mobile disclosed a data breach after some of its customers were apparently affected by SIM swap attacks. The telecommunications provider T-Mobile has disclosed a data breach after it became aware that some of its customers were allegedly victims of SIM swap attacks. Crooks conduct SIM swapping attacks to take control of victims’ phone numbers tricking the mobile operator employees into porting them to SIMs under the control of the fraudsters. Once hijacked…

Read More

United Airlines to Pay $49m to Settle False Data Claim

United Airlines to Pay m to Settle False Data Claim

United Airlines Inc. has agreed to pay $49m to resolve criminal charges and civil claims that it was defrauding the United States Postal Service. The world’s third largest airline entered into International Commercial Air (ICAIR) contracts to transport mail internationally on behalf of the postal service. Under the contracts, United was entitled to full payment only if accurate barcode scans were provided for deliveries and mail was delivered in a timely manner.  Between 2012 and 2015, United engaged…

Read More

When Businesses Get Hacked- Who Are the Victims?

When Businesses Get Hacked- Who Are the Victims?

This article looks into who the victims are when an organization comes under attack. By Nicole Allen, Marketing Executive, SaltDNA. Cyber-attacks occur every two and a half minutes, according to Government statistics, which is why ensuring that your company is protected and secure is critical. Threats can come in several different forms that vary depending on their severity. Hackers are deliberately trying to inflict damage in order to persuade employees to make one mistake which…

Read More
1 2,377 2,378 2,379 2,380 2,381 2,555