Wednesday, July 20, 2016

A healthcare hacker is pressuring victims to pay up

Using compliance as a tool for change

Email not displaying correctly? View it in your browser.

Computerworld Security

Jul 20, 2016
Featured Image

A healthcare hacker is pressuring victims to pay up

TheDarkOverlord claims to have stolen 10 million patient records and is selling them on the black market. But in the meantime, the hacker has also been trying to extort his victims with the promise that the data will never be sold, if a ransom is paid. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

Using compliance as a tool for change
Google says government requests for user data at all-time high
Attackers use DNSSEC amplification to launch multi-vector DDoS attacks
How to improve your incident-response plan

White Paper: KPMG

The Challenge of Governing Your Information

Organizations must address how best to allocate scarce resources to protect and govern information. This question encapsulates the evolving dilemma of information governance. How should an organization protect and govern its information assets when the rate of data growth is estimated to be nearly 50 percent year-over-year? These growth rates present tremendous cost pressures. Read More

Thumbnail Image

Using compliance as a tool for change

Our manager leverages gaps in security compliance to enhance the security program. Read More

Thumbnail Image

Google says government requests for user data at all-time high

Google's semi-annual "Transparency Report" shows that in the second half of 2015, U.S. government agencies made more than 40,000 requests for access to user data. Read More

Thumbnail Image

Attackers use DNSSEC amplification to launch multi-vector DDoS attacks

Incident responders from Akamai recently helped mitigate a DDoS attack against an unnamed European media organization that used six different attack techniques, including DNSSEC-based DNS amplification. Read More

Thumbnail Image

How to improve your incident-response plan

A well-formed, and well-tested, incident response can determine how well an organization responds to a data breach. CSO Online looks at how you can improve your own incident-response plan so to reduce the impact of that data breach. Read More

White Paper: CDW Corporation

Comprehensive Security Assessment

Even as organizations get smarter about guarding their information systems and data, attackers inevitably find new ways in. One of the best defenses against intruders is to learn to play their game. CDW's Comprehensive Security Assessment (CSA) uncovers vulnerabilities by using the same strategies to breach systems that cybercriminals use. Learn more today! Read More

Take our brief survey about ad blockers

Truthfully now, do you use an ad blocker? Take our brief survey and tell us why.

Computerworld's 2016 mobile data service satisfaction survey is underway!

Which carrier's users are the most satisfied with their mobile data service? That's what we want to find out. For the fourth year, Computerworld is polling readers to find out how they feel about their mobile data provider, how much they pay, how they use their mobile data connections and more. Take the survey here

June/July Digital Magazine: 100 Best Places to Work in IT

Check out our June/July Digital Magazine, featuring Computerworld's 100 Best Places to Work in IT report, which highlights top organizations across the country that offer technology pros challenging projects, robust salaries and flexible work/life options. The magazine also includes News Analysis, Opinions and Shark Tank -- all free for download with registration. View the magazine here

Nominate a leader for the 2017 Premier 100 awards

Computerworld has launched its annual search for 100 technology professionals who have demonstrated leadership in their organizations through the use of technology and have the strategic vision to align technology with business goals. The deadline for nominating a candidate for the Premier 100 Technology Leaders awards is Aug. 31, 2016. Make a nomination today!

Subscribe to Computerworld Daily News

Sign up for our popular, twice-daily tech news newsletter. You'll get Computerworld's up-to-the-minute top stories of the day, both first thing in the morning and late in the afternoon (ET). We deliver breaking news on topics like the latest security threats and the newest mobile devices, in-depth features about enterprise technologies and IT careers, and authoritative analyses of moves made by tech companies like Google, Microsoft, Apple, IBM and HP. Sign up now

Subscribe to CSO's Security Awareness Weekly

Sign up for a weekly roundup of features, news, tips and analysis on security awareness delivered to your inbox on Mondays. Sign up now

Computerworld Job Board

Search multiple listings now and get new job alerts as they are posted. Check them out now

Twitter Facebook LinkedIn Google+

You are currently subscribed to Computerworld Security as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@computerworld.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 10:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive