Carded: Hack of Medical ID Card Provider Affects 3.3M
The hack of Newkirk Products, a little known provider of medical ID cards, underscores the dangers third parties pose to regulated health data.
The hack of Newkirk Products, a little known provider of medical ID cards, underscores the dangers third parties pose to regulated health data.
The hack of Newkirk Products, a little known provider of medical ID cards, underscores the dangers third parties pose to regulated health data.
The hack of Newkirk Products, a little known provider of medical ID cards, underscores the dangers third parties pose to regulated health data.
The web was designed as an open platform, a way for people and machines to communicate with each other regardless of borders or other barriers. The network’s architects meant for it to remain that way, but over time it has gradually become more segmented, by nations as well as corporations, and that’s to the detriment of users everywhere.
As more organizations fall victim to cyber attacks, a renewed focus is being put on incident response. Here are five key considerations for creating an effective incident response plan in Part 1 of our new series, The Incident Responder’s Field Guide.
More organizations are turning to managed security services to gain security expertise and lessen the workload of their in-house security staff. Learn more about this option in Data Protection 101, our series on the fundamentals of information security.
More organizations are turning to managed security services to gain security expertise and lessen the workload of their in-house security staff. Learn more about this option in Data Protection 101, our series on the fundamentals of information security.
Data breaches come in all shapes and sizes. Some, like the attacks on Target and Home Depot, are big, public, and expensive. Others can be small and quiet, but no less expensive in the long run.
Data breaches come in all shapes and sizes. Some, like the attacks on Target and Home Depot, are big, public, and expensive. Others can be small and quiet, but no less expensive in the long run.
What steps should businesses take for ransomware protection? 44 security experts weigh in.