September 2016

HITRUST, a consortium of stakeholders collaborating to better secure protected health information, is the first healthcare cyber threat-sharing information organization to connect with the federal government’s cyber threat sharing program. The federal program, launched earlier this year, is the Automated Indicator Sharing Program of the Department of Homeland Security, designed to collect and disseminate cyber […]

by

HITRUST, a consortium of stakeholders collaborating to better secure protected health information, is the first healthcare cyber threat-sharing information organization to connect with the federal government’s cyber threat sharing program. The federal program, launched earlier this year, is the Automated Indicator Sharing Program of the Department of Homeland Security, designed to collect and disseminate cyber […]

by

ADVERTISEMENT WIRED Security is a new one-day event from WIRED, curated to explore, explain and predict new trends, threats, and defences in cyber security. To find out more and to book tickets, click here. When the FBI used a mysterious “third-party” to unlock the iPhone of San Bernardino terrorist Syed Farook earlier this year, all […]

by

You live in a crime ridden city, yet you leave your doors and windows open, display your valuables in plain sight and then wonder why criminals walk in and steal your belongings. Your response is to share your sad story with your neighbors and complain about your loss of privacy. Sound familiar? It should – […]

by

The current managed security services provider model just doesn’t work in our information-rich world. Time to shake things up. Cybersecurity today has reached a turning point. Managing today’s cybersecurity issues requires a new model with which to identify critical information that needs to be protected, a new model to identify the threats that jeopardize that […]

by

Apple launched its own bounty program back in August, promising to reward researchers with up to $200,000 in cash. That’s far from the $1.5 million Zerodium offers, but as Ars Technica notes, the firm has more demands than a corporation-run program. It will only pay that much for an exploit that’s guaranteed to give attackers […]

by

Apple launched its own bounty program back in August, promising to reward researchers with up to $200,000 in cash. That’s far from the $1.5 million Zerodium offers, but as Ars Technica notes, the firm has more demands than a corporation-run program. It will only pay that much for an exploit that’s guaranteed to give attackers […]

by