BreachExchange: by author

299 messages starting Jan 26 16 and ending Jan 07 16
Date index | Thread index | Author index


Audrey McNeil

Vtech restores some online services after hack Audrey McNeil (Jan 26)
6 cyber best practices for the new year Audrey McNeil (Jan 05)
While hackers hit the headlines, insider threats should not be forgotten Audrey McNeil (Feb 24)
Rise of the ethical hackers Audrey McNeil (Feb 08)
Lessons from penetration testing: four simple IT security mistakes that leave a business vulnerable Audrey McNeil (Jan 13)
ICO Announces Revised Privacy Practice Audrey McNeil (Feb 08)
How Businesses Can Avoid a Data Loss Nightmare Audrey McNeil (Mar 30)
Data Breaches are on the Rise in Australia: What if it Happens to You? Audrey McNeil (Feb 25)
Why stolen laptops still cause data breaches, and what's being done to stop them Audrey McNeil (Feb 24)
Tools for protecting your clients’ information are all around you Audrey McNeil (Mar 31)
Securing Payment Card Data: Three Actions to Take Now Audrey McNeil (Mar 11)
How big data, info sharing make hackers' lives harder Audrey McNeil (Mar 03)
Big Data Analysis Makes Breaches a Greater Threat to Cyber-Security Audrey McNeil (Feb 19)
New year, new trends in cybersecurity Audrey McNeil (Jan 20)
Idea to retire: Information security is IT security Audrey McNeil (Mar 31)
California Data Breach Report Defines “Reasonableness” Standard for Data Protection Audrey McNeil (Mar 08)
Sorry, Your Business Will Never Be Safe. But Here's What You Can Do About It. Audrey McNeil (Feb 22)
Responsibility Shifting for Cyber Attacks? Audrey McNeil (Feb 23)
Beware Of Social Media And Cybersecurity Audrey McNeil (Mar 01)
Australian industry lashes out at data breach notification scheme Audrey McNeil (Mar 23)
Why security is really all about trust Audrey McNeil (Mar 10)
Why CXOs ignore data quality problems Audrey McNeil (Feb 25)
VTech Security: Fool Me Once ... Audrey McNeil (Feb 12)
Ramping up Employee Cyber Security Training in 2016 Audrey McNeil (Mar 22)
Professor sheds light on increase in cyber crimes Audrey McNeil (Feb 11)
How Much Would You Pay to Prevent a Breach? Audrey McNeil (Feb 10)
What's your cybersecurity whistleblower strategy? Audrey McNeil (Jan 06)
The Lurking Threat Audrey McNeil (Feb 23)
Managing the Cybersecurity Threat Audrey McNeil (Jan 14)
What are you doing to spot a breach? Audrey McNeil (Mar 08)
Security doesn't just happen, cyber experts say Audrey McNeil (Mar 25)
Ensuring EHRs Are Secure: A New Approach Audrey McNeil (Jan 21)
Throwaway security terms and the danger to businesses Audrey McNeil (Mar 23)
What New Cybersecurity Rules in Europe Mean for Financial Bodies Audrey McNeil (Jan 18)
No More Narrow Focus: Is 2016 the Year of Cyber-Risk? Audrey McNeil (Jan 13)
Survey says: Data breaches in other industries will damage financial institutions Audrey McNeil (Jan 26)
How To Protect Your Business From Social Media Security Threats Audrey McNeil (Feb 25)
Site that Shared Alleged FBI, DHS Data Shut Down Audrey McNeil (Feb 12)
Next-gen cyber threats Audrey McNeil (Feb 24)
CRS sheds light on enforcement authority in data breach notification legislation Audrey McNeil (Jan 08)
Data breaches often result in CEO firing Audrey McNeil (Mar 07)
Cyber crime is a threat and British businesses can’t afford to ignore it Audrey McNeil (Jan 15)
Cybersecurity rising as health IT concern Audrey McNeil (Feb 29)
You Can't Hide Behind Your EULA Audrey McNeil (Feb 23)
Thwarting the threat actors: What government can do Audrey McNeil (Mar 08)
What we can learn from three key 2015 data breaches Audrey McNeil (Jan 08)
Dealing With Careless Users as a CIO Audrey McNeil (Feb 10)
The Knock-Down, Drag-Out Fight Over Cybersecurity Legislation Audrey McNeil (Jan 20)
ICO launches data privacy assessment tool for SMEs Audrey McNeil (Feb 01)
How the CFO can act as any cybersecurity team's 'quarterback' Audrey McNeil (Jan 13)
Cyber thieves cash in big with just 50 credit cards. Audrey McNeil (Feb 23)
MedStar Cyber Attack Shows Need for HHS to Implement Cybersecurity Law Audrey McNeil (Mar 30)
Email security – it’s up to the CIO and CEO! Audrey McNeil (Jan 21)
CFOs Get A Break From Hackers Audrey McNeil (Mar 16)
Follow the data to improve security preparedness, hospital CISO says Audrey McNeil (Mar 14)
Cyber insurance 2015: Inside a robust and rapidly changing market Audrey McNeil (Jan 04)
Ensuring IT resilience in the face of change Audrey McNeil (Jan 12)
Protecting your business against fraud Audrey McNeil (Mar 25)
Five Cybersecurity Questions Every Executive Should Ask Audrey McNeil (Feb 05)
Cybersecurity and international data transfer Audrey McNeil (Feb 15)
3 Sources of Cyberattacks – and 3 Preventive Steps Government Can Take (Industry Perspective) Audrey McNeil (Mar 29)
The IRS Hack Was Twice as Bad as We Thought Audrey McNeil (Feb 29)
Government IT is an Atari Game in an Xbox World Audrey McNeil (Feb 24)
Combatting ransomware with a few easy threat mitigation steps Audrey McNeil (Mar 10)
Why Data Security—and Third-Party Vendors—Is an NCUA Priority Audrey McNeil (Feb 01)
Vishing and smishing: The rise of social engineering fraud Audrey McNeil (Jan 04)
Tax Benefit for Early Cybersecurity Protections Audrey McNeil (Jan 27)
Cyber security is more about you than technology Audrey McNeil (Feb 26)
When hacking got personal in 2015 Audrey McNeil (Jan 05)
Risk-Averse CFOs A Natural Fit For Cybersecurity Audrey McNeil (Jan 21)
No Cybersecurity Crying in ’16 Audrey McNeil (Jan 06)
Cyber Liability a Growing Threat to CPAs Audrey McNeil (Feb 25)
Companies ill-prepared for cyber attacks in 2016 Audrey McNeil (Jan 08)
TRENDnet Devices Bundle Infamous scfgmgr Service Audrey McNeil (Jan 12)
Businesses are still scared of reporting cyberattacks to the police Audrey McNeil (Mar 04)
Cyber Insurance: Make Sure You Understand Your Coverage Audrey McNeil (Mar 24)
Update on Canadian Data Breach Regulations Audrey McNeil (Mar 07)
Apple, FBI Escalate Crypto Fight Audrey McNeil (Feb 23)
Why manual processes become security risks Audrey McNeil (Mar 17)
No One Should Ever Pay to Remove a Bitcoin Ransomware Infection Audrey McNeil (Feb 22)
Holistic Data Protection for the SMB: Five Steps for MSPs Audrey McNeil (Feb 29)
Shoppers blame retailers for security breaches Audrey McNeil (Mar 29)
It takes 69 days to discover breaches Audrey McNeil (Mar 30)
Three steps to help manage security alert overload Audrey McNeil (Jan 26)
Hospital Forced Back to Pre-Computer Era Shows the Power of Ransomware Audrey McNeil (Feb 19)
5 reasons you need to hire a Chief Privacy Officer Audrey McNeil (Feb 04)
Why internal endpoints are a quick win in the fight against data theft Audrey McNeil (Mar 30)
Cyber attacks remain top business threat for second year in a row Audrey McNeil (Feb 11)
CSI: Cyber-Attack Scene Investigation--a Malware Whodunit Audrey McNeil (Jan 29)
Hacking Hospitals And Holding Hostages: Cybersecurity In 2016 Audrey McNeil (Mar 29)
Tips for choosing the best encryption solution for your organization Audrey McNeil (Feb 05)
The surprising cyber risks facing your small business clients Audrey McNeil (Feb 09)
Data protection starts with security, but disclosure remains key Audrey McNeil (Feb 11)
How SMBs can avoid being the victim of a cyber attack Audrey McNeil (Feb 05)
Data loss: five steps to protect your customers’ business Audrey McNeil (Feb 12)
Violate Patient Data Safety At Your Peril, Warns Judge Audrey McNeil (Feb 12)
One-Quarter Of Organizations Do Not Encrypt Sensitive Data Audrey McNeil (Feb 03)
HIPAA enforcement in 2016: Is your practice ready? Audrey McNeil (Feb 23)
Wendy’s: Where’s The Breach?! Audrey McNeil (Jan 28)
What is on the cyber security horizon in 2016? Audrey McNeil (Jan 26)
Lessons learned? A look back at five cyber-security trends of 2015 Audrey McNeil (Jan 14)
The agency that stepped up: Federal Trade Commission Audrey McNeil (Mar 23)
What Solutions Providers Can Learn From The Potential Wendy's Data Breach Audrey McNeil (Feb 03)
10 Lessons From FTC Guidance on Data Security Audrey McNeil (Mar 01)
Without information security processes, you are flying blind Audrey McNeil (Mar 31)
Businesses underestimating growing cyber security threats Audrey McNeil (Feb 04)
As Health IT Matures, Security Approaches Must Mature With It Audrey McNeil (Jan 29)
Will You Experience The Next Data Breach? Audrey McNeil (Feb 10)
IoT Security Checklist: Get Ahead Of The Curve Audrey McNeil (Mar 04)
Company Leaders Worry About Liability for Breaches Audrey McNeil (Jan 20)
Stop waiting and start hunting Audrey McNeil (Feb 22)
Four key predictions for enterprise security in 2016 Audrey McNeil (Feb 08)
Who watches over your data – and how do you know it won't go AWOL? Audrey McNeil (Mar 15)
Why we need a reality check on passwords Audrey McNeil (Jan 25)
Security from the Ground Up: The Need for Data Classification Audrey McNeil (Mar 23)
Top 10 Ways to Protect Your Company’s Data Audrey McNeil (Mar 10)
Tellers are overlooked as threat to data safety Audrey McNeil (Feb 19)
Cybersecurity checklist is a cyber strategy tool for increasing attack cost Audrey McNeil (Mar 03)
5 Best Practices to Secure Your Business Data Audrey McNeil (Mar 16)
The Need for Private-Public Partnerships Against Cyber Threats -- Why A Good Offense May be Our Best Defense. Audrey McNeil (Jan 04)
Beleaguered OPM CIO Departs Audrey McNeil (Feb 23)
Data Breaches: ‘The Third Certainty in Life’ Audrey McNeil (Feb 05)
Don't shortchange website security Audrey McNeil (Jan 14)
Ransomware gets a lot faster by encrypting the master file table instead of the filesystem Audrey McNeil (Mar 29)
Sixth Circuit Rejects FCA Claim Based on Health Data Breach Audrey McNeil (Mar 15)
4 Simple Ways to Help Protect Your Business From Cybercrime Audrey McNeil (Jan 21)
Cyber-Insurance: Is It Right for Your Business? Audrey McNeil (Mar 16)
Specifically identifying your trade secrets is the first step in being able to protect them Audrey McNeil (Feb 12)
App security: The most overlooked cybersecurity measure Audrey McNeil (Mar 03)
Amid Data Breaches, State Agencies Need to Deploy Backup Technologies Audrey McNeil (Mar 31)
TalkTalk's cyber-security lesson Audrey McNeil (Feb 05)
How to boost employee awareness in the age of the insider threat Audrey McNeil (Mar 11)
3 reasons why your cybersecurity plan needs to be revised Audrey McNeil (Feb 19)
Why Hackers Want to Attack Your Small Business Audrey McNeil (Jan 14)
Healthcare data breaches lead more patients to withhold information from doctors Audrey McNeil (Feb 22)
EHR security breach does not constitute false Meaningful Use attestation Audrey McNeil (Mar 14)
Deleting Data Vs. Destroying Data: The Difference Can Be Damning Audrey McNeil (Feb 23)
Rules of Cybersecurity Changing for Healthcare Sector Audrey McNeil (Mar 01)
Bitcoin is Not the Root Cause of Ransomware Audrey McNeil (Mar 10)
TalkTalk cyber attack a ‘car crash’ which should warn industry, says watchdog Audrey McNeil (Jan 29)
Security Think Tank: User education is first line of defence against ransomware Audrey McNeil (Feb 03)
Cyber insurance offers companies a safety net from online hackers Audrey McNeil (Feb 23)
Are Your Trade Secrets Gone Without A Trace? Audrey McNeil (Feb 29)
Ransomware: Why does this cyber threat keep growing? Audrey McNeil (Mar 24)
Create your human firewalls Audrey McNeil (Mar 07)
Healthcare data breaches on the rise: Implications and solutions Audrey McNeil (Mar 11)
Malware in the Hospital Audrey McNeil (Jan 26)
Good security begins with the endpoint in mind Audrey McNeil (Mar 04)
In era of data breaches, businesses need strong document policies Audrey McNeil (Feb 01)
When it comes to cybersecurity, don't overlook staff education Audrey McNeil (Mar 30)
2016 HIPAA Audits to Begin: Are you Confident in Your HIPAA Compliance? Audrey McNeil (Jan 29)
Security by design - an essential requirement for privacy Audrey McNeil (Jan 27)
Preventing data breaches and leakage: Important steps for website owners Audrey McNeil (Feb 15)
You Could Lose More Than Just Customers: Why You Should Lock Up to Crack Down on Cyber Risks Audrey McNeil (Feb 10)
10 tips to help you defend and protect your business from ID theft Audrey McNeil (Jan 12)
Why Cybersecurity Should Be Every Company's Priority Audrey McNeil (Mar 08)
Class Action Claims Wendy’s Negligently Exposed Customer Payment Info In January Breach Audrey McNeil (Feb 23)
Defending Your Data Audrey McNeil (Feb 03)
The Privilege of PR: Application of the Attorney-Client Privilege to Crisis Communications and Public Relations in Breach Response Planning Audrey McNeil (Jan 22)
Data breach four-times worse than CEO quitting Audrey McNeil (Mar 24)
OCR issues new guidance on individuals’ access to PHI: Is your access policy compliant? Audrey McNeil (Jan 22)
New Year, new threats: 6 email resolutions to protect your data Audrey McNeil (Feb 12)
5 Ways a Firm Can Stop a Data Breach Lawsuit Audrey McNeil (Feb 03)
The Sophisticated Hack: Business Email Compromise Audrey McNeil (Feb 24)
Keeping pace with the evolving cyber crime landscape Audrey McNeil (Mar 07)
5 tips to protect your admin credentials Audrey McNeil (Feb 10)
The human problem at the heart of Snapchat’s employee data breach Audrey McNeil (Mar 01)
Contract Corner: Contract Terms Associated with Data Breaches—It’s a Balancing Act Audrey McNeil (Mar 03)
SMEs are at risk from cyber-criminals Audrey McNeil (Feb 01)
Litigation Watch: Can a Third-Party Vendor Be Left Holding the Bag After a Breach? Audrey McNeil (Feb 10)
A new dawn of data breach awareness in 2016 Audrey McNeil (Jan 18)
Hacked Companies ‘Should Go Public’, Says Ex-Minister Audrey McNeil (Jan 12)
CIOs Need To Think More Like CEOs Audrey McNeil (Mar 29)
What Star Wars can teach us about cyber ethics Audrey McNeil (Jan 14)
Are Retirement Plan Fiduciaries Required to Prevent Cyberattacks? Audrey McNeil (Mar 07)
Data-Breach Claims Against Anthem Not Preempted by FEHBA Audrey McNeil (Feb 19)
Firms Feel More Confident In Ability to Thwart Data Breaches Audrey McNeil (Feb 09)
Cyber dominates top ten legal risks for business in 2016 Audrey McNeil (Feb 09)
Cyber security needs to be to tackled from all angles Audrey McNeil (Feb 22)
Keeping Patient Information Secure When Implementing IoT Audrey McNeil (Mar 14)
Perspective: What Will Be the Defining Cybersecurity Issues In 2016? Audrey McNeil (Jan 20)
What the board needs to know about cybersecurity compliance Audrey McNeil (Jan 20)
How Secure is Your Company Data? Internal Security Breaches and How to Avoid Them Audrey McNeil (Mar 04)
Cyberthreat Information Sharing Privacy Concerns Raised Audrey McNeil (Mar 16)
Incident Response Tip: Five Ways to Improve Information Security and Reduce the Impact of a Data Breach Audrey McNeil (Jan 04)
The 10 Essential Cybersecurity Training Issues for Your Employees Audrey McNeil (Mar 16)
ICO warning over personal data breaches Audrey McNeil (Mar 17)
Here’s the Real Way Hackers Will Get Your Information Online Audrey McNeil (Mar 07)
Got ransomware? What are your options? Audrey McNeil (Mar 03)
What is your risk number? Audrey McNeil (Jan 25)
Halting Hackers From Sabotaging Computer Systems Audrey McNeil (Mar 10)
TalkTalk Took a Big Bath Over Breach Audrey McNeil (Feb 10)
Five Keys To Crafting A Cybersecurity Policy For Your Business Audrey McNeil (Jan 04)
Hocus-pocus! The stupidity of cybersecurity predictions Audrey McNeil (Jan 06)
The importance of cyber due diligence in M&A transactions Audrey McNeil (Feb 25)
This is what it looks like when your website is hit by nasty ransomware Audrey McNeil (Feb 22)
The Seventh Circuit Revisits Standing for Data Breach Class Actions Audrey McNeil (Feb 09)
Ransomware can be an expensive phishing lesson Audrey McNeil (Feb 29)
Third of US banks OK with passwords even social networks reject Audrey McNeil (Mar 03)
Legal Mandates Fuel Cybersecurity Insurance Growth Audrey McNeil (Jan 21)
Details of Anthem's massive cyberattack remain in the dark a year later Audrey McNeil (Mar 30)
Staminus Breach: Just How Bad Is It? Audrey McNeil (Mar 14)
Breakthrough in cybersecurity is no phish story Audrey McNeil (Mar 29)
Plaintiffs Use Privacy Pledge Against Insurer in Data Breach Claim Audrey McNeil (Mar 11)
Breach notification in Europe: The GDPR’s far-reaching implications Audrey McNeil (Mar 14)
Look for additional data breach class action cases, standing decisions and shareholders’ derivative suits in 2016 Audrey McNeil (Jan 12)
Cyber insurance rates fall with lull in major hacks Audrey McNeil (Mar 31)
Installed Faster Than You Can Say Skimmer! Audrey McNeil (Mar 22)
How cyber criminals use social engineering Audrey McNeil (Feb 04)
Privacy In The Age Of The Data Breach Audrey McNeil (Jan 29)
Report your data breach: 5 best practices to avoid breaching data regulation Audrey McNeil (Jan 12)
5 Takeaways from FDA's Draft Guidance on Postmarket Management of Cybersecurity Risks in Medical Devices Audrey McNeil (Mar 22)
The Perils of BYOD Policies Audrey McNeil (Jan 21)
Bank Tellers, With Access to Accounts, Pose a Rising Security Risk Audrey McNeil (Feb 03)
Data governance and protection Audrey McNeil (Jan 15)
How to respond to a cyberattack Audrey McNeil (Feb 23)
Data Breach Class Action Against Michael Stores Doesn’t Stick Audrey McNeil (Jan 25)
Five Security Must-do's For First Time Cloud Users Audrey McNeil (Jan 08)
Is OCR Scrutinizing Those with Multiple Breaches? Audrey McNeil (Jan 06)
Phishing Attacks Among Greatest Plague Facing Healthcare Audrey McNeil (Feb 03)
Ridiculously simple security settings your IT guy wishes you knew Audrey McNeil (Mar 01)
Virginia Tech Laments Secrecy of Hacker Tip-Offs from Feds Audrey McNeil (Mar 16)
Bringing better security to BYOD Audrey McNeil (Feb 23)
The next step for information risk management Audrey McNeil (Feb 25)
Internal auditors challenged by cyber-security, data quality Audrey McNeil (Feb 19)
Computer security: If you have to call the FBI, it’s too late Audrey McNeil (Mar 11)
This Court Case Could be a Major Blow to the FTC’s Data Security Efforts Audrey McNeil (Jan 15)
Security leaders need to ask this question to get the success they seek Audrey McNeil (Jan 08)
Home Depot deal may set standard for cyber breach settlements Audrey McNeil (Mar 15)
Amid Hacking Threats, Law Firms Turn to Cyber Insurance Audrey McNeil (Mar 22)
Document shredder leaves data security in tatters Audrey McNeil (Mar 17)
Protecting Online Information Audrey McNeil (Mar 25)
Tearing Down the Silos Audrey McNeil (Feb 09)
5 sins cybersecurity executives should avoid Audrey McNeil (Jan 05)
A Mobile Device Triggered a HIPAA Breach In Your Office…Now What? Audrey McNeil (Jan 15)
Increasing Demand for Cyber Insurance Audrey McNeil (Jan 06)
Data Breach Class Action Against SuperValu Doesn’t Check Out Audrey McNeil (Feb 24)
Identity Theft Is No Small Problem: How to Protect Your Business Audrey McNeil (Jan 25)
2016 – The Year of the Cyber Exploit Audrey McNeil (Jan 04)
Only a quarter of cyber security employees say their firm has cyber insurance Audrey McNeil (Jan 25)
PwC CEO survey: 61 percent believe cyberthreats pose a danger to corporate growth Audrey McNeil (Jan 20)
10 Habits Threatening Your Company's Data Audrey McNeil (Mar 08)
You can't stop what you can't see: Mitigating third-party vendor risk Audrey McNeil (Jan 08)
DHS Data Leaked, Who’s Next? Audrey McNeil (Feb 08)
Victims or Villains: Intelligent Incident Response Can Save the Day Audrey McNeil (Jan 06)
Four health care providers report breaches: Protecting data not high priority? Audrey McNeil (Jan 22)
Protect Your Employees’ Personal Information or You’re Putting Your Business at Risk Audrey McNeil (Mar 15)
A third of email sent to U.S. House is malware, a virus or spam Audrey McNeil (Mar 22)
Cyber security is a risk management game Audrey McNeil (Feb 29)
Solving the bulk password theft puzzle Audrey McNeil (Mar 08)

Inga Goddijn

Ukrainian Power Grid Hack: 9 Questions Inga Goddijn (Jan 07)
Card Breach Affects 250 Hyatt Hotels Worldwide Inga Goddijn (Jan 15)
Latest Office of Civil Rights Enforcement Action: Underbed Storage is Not Appropriate for Personal Health Information Inga Goddijn (Feb 09)
Wendy's investigating possible POS breach Inga Goddijn (Jan 28)
Don't want your new system getting hacked? Follow these 13 steps and you might just avoid it Inga Goddijn (Mar 21)
Opinion: Squirrels are bigger threat than hackers to US power grid Inga Goddijn (Jan 07)
Anon steals a bunch of data from NASA, threatens to release it Inga Goddijn (Feb 04)
Government Foreshadows New Privacy Obligations Inga Goddijn (Feb 17)
Sophisticated hacking system may be behind hoax threats received by Australian schools Inga Goddijn (Feb 04)
Top tips: The Do’s and Don’ts of cybersecurity for retailers Inga Goddijn (Feb 17)
Consumer Financial Protection Bureau takes action against Dwolla for misrepresenting data security practices Inga Goddijn (Mar 02)
PHP ransomware attacks blogs, websites, content managers and more… Inga Goddijn (Mar 02)
Why Software Patching is Essential in Today's World Inga Goddijn (Mar 21)
Not worth the cost: 3 lessons about unprotected PHI Inga Goddijn (Mar 09)
Treating IP addresses as personal data is best approach for businesses, says expert Inga Goddijn (Mar 09)
FBI and Microsoft Warn of Samas Ransomware Inga Goddijn (Mar 21)
Unhealthy Rise In Healthcare Fraud: 5 Tips For Protecting Patient Privacy Inga Goddijn (Mar 21)
5 rules for effective privileged user account management Inga Goddijn (Feb 17)
Why any organization can suffer a healthcare breach, and 5 tips for keeping PHI safe Inga Goddijn (Jan 28)
PC Matic… Is It As Amazing As Seen on TV? Inga Goddijn (Mar 02)
2015 Reported Data Breaches Surpasses All Previous Years Inga Goddijn (Feb 05)
Improper disclosure of research participants’ protected health information results in $3.9 million HIPAA settlement Inga Goddijn (Mar 17)
HR Departments Part 2: Still Out Phishing? Inga Goddijn (Mar 17)
10 social engineering exploits your users should be aware of Inga Goddijn (Jan 28)
How to Prepare for 'Phase Two' HIPAA Compliance Audits Inga Goddijn (Mar 29)
Changes To The Mailing List Inga Goddijn (Feb 23)
4 healthcare data breach lessons to take to heart Inga Goddijn (Mar 02)
7 steps hackers take to execute a successful cyber attack Inga Goddijn (Feb 04)
Post-Breach Costs And Impact Can Last Years Inga Goddijn (Jan 28)
Security Think Tank: Four steps for companies to protect against ransomware Inga Goddijn (Feb 04)
2016: The year of the gas station skimmer Inga Goddijn (Jan 28)
Linode Resets Passwords as DDoS Attacks Continue Inga Goddijn (Jan 07)
When Business Computers Are Held For Ransom, Downtime Is Biggest Cost Inga Goddijn (Mar 21)
FAQ: What the heck happened to Linux Mint? Inga Goddijn (Mar 02)
FOLLOW UP: IoT Security Checklist: Get Ahead Of The Curve Inga Goddijn (Mar 10)
$1.55 million settlement underscores the importance of executing HIPAA business associate agreements Inga Goddijn (Mar 17)
EU-U.S. Privacy Shield Framework Text Published: Imposes New Obligations on U.S. Entities that Seek Data Transfers from the EU Inga Goddijn (Mar 09)
Seven ways to detect ransomware beyond antivirus Inga Goddijn (Mar 09)
What we’ve learned from malware epidemics Inga Goddijn (Mar 18)
HHS Office For Civil Rights Releases A Crosswalk Between HIPAA Security Rule And NIST Cybersecurity Framework Inga Goddijn (Mar 09)
Over 22,000 USBs May Have Been Left in Dry Cleaners Inga Goddijn (Jan 15)
JavaScript Analytics Code Can Be Used to Compromise US Banks Inga Goddijn (Feb 17)
NIST releases updated telework guidance Inga Goddijn (Mar 21)
Massachusetts Court: Patients Have Standing to Sue for Data Breach Based on Data Exposure Alone Inga Goddijn (Jan 07)
The Danger of Apps that Die Inga Goddijn (Mar 17)
Employment Dept. computers still vulnerable a year after breach Inga Goddijn (Jan 07)
Dark Web Honeypot Shows How Quickly Leaked Passwords Attract Hackers Inga Goddijn (Feb 22)
Bad vibrations: UCI researchers find security breach in 3-D printing process Inga Goddijn (Mar 02)

Richard Forno

Time Warner Cable Warns Some Customer Email Addresses, Passwords May Be Compromised Richard Forno (Jan 07)