Infirmary Health System is the largest non-government healthcare team in Alabama, treating more than 100,000 patients annually. The organization deployed a security solution to qualify for meaningful use dollars and reduced security incidents significantly.
Download this case study and learn:
Why Infirmary Health...
An attack campaign involving a trojanized version of the CCleaner Windows utility, built and distributed by British developer Piriform, was much more extensive than it first appeared and may have installed backdoor software on endpoints at hundreds of large technology firms.
In cryptocurrency we trust: The government of North Korea has been turning to bitcoin exchange heists and cryptocurrency mining - potentially using malware installed on other countries' systems - to evade sanctions and fund the regime, security experts say.
Ransomware variants are implementing new, innovative techniques that employ unknown binaries and non-malware tactics to evade and bypass traditional defenses. Their encryption techniques go beyond simple files and shares to make it even harder to restore using backups; and their targets are increasingly becoming...
Yes, malware commonly targets the Windows operating system. But if you limit malware analysis to Windows OS, you're leaving gaping vulnerabilities, says Christopher Kruegel of Lastline Inc. Here's how to maximize your analysis.
Kruegel, CEO of Lastline, says that one common limitation of malware analysis is that...
Leading the latest edition of the ISMG Security Report: Observations about America's standing as a global cybersecurity leader from Christopher Painter, who until earlier this summer served as the United States' top cyber diplomat. Also, threats posed by IoT devices.
The ISMG Security Report leads with views on a novel way to fund the growth of the United States military's Cyber Command by seizing assets such as digital currencies from hackers and other criminals. Also, we offer tips on how to recruit scarce IT security pros.
A list of weak credentials for vulnerable Internet of Things devices has prompted a new effort to notify their owners. The fear is of another mass, IoT-fueled DDoS attack along the lines of last year's Mirai attacks.
The never-ending stream of bad information security news is fueling a virtual gold rush for companies offering protection. A new report from Forrester predicts a healthy growth rate over the next five years, with some specific technologies expected to see double-digit growth.
EDR (endpoint response and detection) products are powerful tools that provide a play-by-play of exactly what happened on a computer during and after an attack. But the products require the right expertise to get the most value, a Gartner analyst says.
Contrary to common assumption, "advanced malware" is not a singular type of superior malicious code or harmful object that can that compromises systems, harvests data or damages corporate networks. Rather, this term describes sophisticated behavior and evasion capabilities that certain strands of malware possess which...
Finding an effective breach prevention provider is critical in order to safeguard an organization's assets. NSS Labs subjected nine cybersecurity market leaders to comprehensive, rigorous testing to determine how well each product handled current advanced threats and attack methods. All vendor products were evaluated...
The latest ISMG Security Report leads with information security guru Ron Ross discussing changes coming to the National Institute of Standards and Technology's catalog of IT security and privacy controls. Also, challenges facing an upgraded U.S. Cyber Command.
The latest edition of the ISMG Security Report leads with a closer look at a new exploit kit and whether it represents a resurgence in these types of criminal packages. Also featured: a discussion of new vehicle security concerns and communications advice for CISOs.