Cybersecurity

 
 
  • Pacemakers Recalled For Lax Cybersecurity

    Almost 500,000 pacemakers sold by Abbott under the St Jude Medical brand have been recalled by the FDA for fear that malicious hackers could easily run their batteries down or alter the patient’s heartbeat. The vulnerability allows...

    • Posted 3 weeks ago
    • 0
  • Using Big Data Analysis To Protect Against Internal Threats

    The disgruntled engineer, the employee angling for a new job, or just the chatty manager who likes to tell people how much he knows about the business – they may all constitute a potential threat to a...

    • Posted 4 weeks ago
    • 0
  • Privacy Is The Tradeoff For Convenience On The Internet

    Surveillance is the business model of the internet, according to an article in Harvard Law Today, and consumers are resigned to giving up privacy for convenience. Edward Snowden increased people’s awareness, but not much changed. The USA...

    • Posted 4 weeks ago
    • 0
  • Government Does Miserable Cybersecurity Job

    According to an analysis of 552 local, state and federal organizations by risk management firm SecurityScorecard, government ranks better than telecommunication and education when it comes to cybersecurity, but worse than transportation, financial services, retail, and just...

    • Posted 4 weeks ago
    • 0
  • Is Fear Of Data Breach Injury Grounds For A Lawsuit?

    Can someone whose information was stolen sue over fear of future injury even where there is no evidence an actual injury has occurred? A recent decision from the Court of Appeals for the DC Circuit further deepens...

    • Posted 4 weeks ago
    • 0
  • Don’t Let Data Walk Out The Door

    Hacking generates the headlines, but by far the most common way for confidential company information to enter the public domain is by way of departing employees who take it with them. One study found that half the...

    • Posted 1 month ago
    • 0
  • Are Spoof Victims Covered By Computer Fraud Insurance?

    Spoofing, sometimes known as “payment instruction fraud,” typically involves a phony invoice or an instruction to wire funds to an offshore account. These schemes, although rare, have become increasingly sophisticated and have bilked victims out of millions....

    • Posted 1 month ago
    • 0
  • Find the Right Cyber Insurance Policy

    Cyber insurance policies have evolved rapidly over the last several years as the insurance industry seeks to align available coverage with risk and demand while avoiding massive losses. Insurers offer first and third party insurance. First party...

    • Posted 1 month ago
    • 0
  • Cyberspace Will Be Regulated Soon, Magazine Predicts

    The federal government has been slow to respond to cybersecurity risk, but according to Stratfor Worldview, it will increasingly turn its attention to developing a strong cyberdefense policy, and the resulting regulations will increase the risk of...

    • Posted 1 month ago
    • 0
  • Proposed Law A Game-Changer For IoT Security

    Taking a backdoor approach to a looming cybersecurity problem, legislation proposed by a bipartisan group of senators would impose significant obligations on government contractors who supply an “internet-connected device.” An analysis of the Internet of Things (IoT)...

    • Posted 1 month ago
    • 0