GDPR Compliance: A Carrot or Stick Approach?

As most of you know, the new General Data Protection Regulation (GDPR) comes into forceon May 25, 2018 and will introduce major new laws for data processing in European Union (EU) member countries and anywhere EU personal data is processed. In other words, even if your business is based in the U.S., if you process data of EU…

Tracking Malicious Insiders: Catch Me If You Can

The idea of malicious insiders stealing valuable assets brings to mind a picture of masked men breaking into a bank vault or museum and making a getaway with their illicit stash. But what if the enemy is one of us — someone who knows exactly where we keep our most valuable items, how we safeguard…

Most top US higher ed institutions fail to protect students from phishing

88.8 percent of the root domains operated by top colleges and universities in the United States are putting their students, staff and other recipients at risk for phishing attacks that spoof the institution’s domain, according to 250ok. Phishing and spoofing attacks against consumers are likely when companies do not have a published Sender Policy Framework…

Healthcare Experiences Twice the Number of Cyber Attacks As Other Industries

Healthcare has become the second largest sector of the U.S. economy, accounting for 18% of gross domestic product (GDP) in 2017, and is rivaled only by U.S. Federal Government’s 20% share of GDP in the same year. Not surprisingly, IT spending in healthcare is keeping pace, reaching $100 billion in 2017. As healthcare sector technology spending grows, so does the sector’s…

Young People May Shun Passwords, But That Doesn’t Mean They’re Less Identity-Conscious

Pity the poor password. Maligned for years, it’s nevertheless still hanging on as the dominant form of access and identity protection for online accounts of all types. Despite years of industrywide efforts to educate users about the importance of employing difficult-to-guess passwords, the list of the most frequently used passwords has changed little. One analysis of 10…

Where Rubber Meets the Road: Exposed Credentials in the Cloud Facilitate Cryptocurrency Mining

Cloud and DevOps enable powerful, transformational advances across many businesses – from finance to manufacturing. But, what happens when a cyber attacker gets a hold of the access keys to the cloud account of a leading automobile manufacturer? Well, as learned in the recently reported breach at Tesla, the attackers exploited access to mine for cryptocurrency! Reportedly,…

SAS postscript: Webinar on IT security vulnerabilities in healthcare

Each year, the Kaspersky Security Analyst Summit (SAS) brings together cybersecurity specialists from all over the world to share expertise, discuss new trends, and present their research. For those who can’t attend this year’s event but still want to get acquainted with the latest research, we’ve planned a series of webinars that will cover major SAS findings….