The search found 4228 results.
Pearson Vue, a third-party certification manager, discovered malware on their Credential Manager System. Major clients, like Cisco, Oracle, and IBM react.
Whether you work with only a few vendors, hundreds, or thousands, your network is only as safe as the security practices of your weakest partner.
By now, we’re all pretty familiar with biometrics as a way to measure a person's physical characteristics to verify their identity. Most of us use biometrics daily to log in to our mobile devices via a fingerprint or face scan or to activate a home personal assistant device like Amazon Alexa or Google Home using our voice. These are popular methods of consumer biometrics.
Five key questions to ensure a strong risk profile with cyber security insurers and minimize the cost of skyrocketing premiums.
At the 23rd National HIPAA Summit in Washington, D.C., regulators and privacy professionals met to discuss the challenges associated with ensuring the security of EMR data and the appropriate use of protected health information (PHI).
In order to know the true cost of exposed medical records, it’s important to understand why this information is targeted. Learn more in this article.
The Chief Financial Officer (CFO) is the latest voice from the boardroom professing serious concern about their level of cyber-attack preparedness.
New study shows 33% of data breaches in the retail space were due to third-party vendor access vulnerabilities.
In a not-surprising announcement yesterday, Home Depot reported: “Criminals used a third-party vendor’s user name and password to enter the perimeter of Home Depot’s network.