RiskWatch

Zeus Variant Targets U.S. Accounts

Zeus Variant Targets U.S. Accounts August 23, 2012 Corporate Security | Facilities Security FBI Warning Reiterates Citadel Malware Threats Banking institutions need to take action to thwart the latest generation of targeted ransomware and malware attacks that hijack computer operating systems and launch keyloggers to steal online banking credentials and other financial information. The attacks, […]

Congress can’t improve cybersecurity alone

Congress can’t improve cybersecurity alone August 21, 2012 Corporate Security With the Senate failing to advance the Cybersecurity Act of 2012 (S.3414) to a full vote earlier this month, we must take this opportunity to engage in an honest dialogue about the risks that exist to our nation’s critical and cyber infrastructure. In order to […]

ONC Plans Mobile Security Guidance

ONC Plans Mobile Security Guidance August 20, 2012 Corporate Security The Office of the National Coordinator for Health IT is studying use of mobile devices in small healthcare environments. The goal: new mobile security guidance that will be released in 2013. The Office of the National Coordinator for Health IT next spring will release a […]

Global Hackers Target U.S. Banks

Global Hackers Target U.S. Banks August 16, 2012 Corporate Security | Identity Theft Expert: Nation States, Crime Rings Pose Increasing Threat Banks and the U.S. payments infrastructure are prime targets for international cyberattacks. And it’s not just money hackers are after, says Bill Wansley of Booz Allen Hamilton. What else is at risk? Wansley, a […]

6 Steps to Handle IT Security Incidents

6 Steps to Handle IT Security Incidents August 13, 2012 Corporate Security The National Institute of Standards and Technology has issued a revision of its guidance to help organizations establish programs to manage computer security incidents. NIST, in Special Publication 800-61 Revision 2: Computer Security Incident Handling Guide, spells out what incident-response capabilities are necessary to rapidly detect […]

Coming of Age of Cyber Insurance

Coming of Age of Cyber Insurance August 12, 2012 Corporate Security Cyber Benefits from Shift to Enterprise Risk Management Flipping through the 150-page 2012 RIMS Benchmark Survey, in preparation for an interview on the study’s findings (see Social Media Risks: Weigh Pros, Cons), I noticed lots of figures on payouts for auto, aviation, fiduciary, marine, malpractice, worker’s compensation […]

Healthcare Anti-Fraud Coalition Formed

Healthcare Anti-Fraud Coalition Formed August 9, 2012 Corporate Security | Facilities Security | Hospital Security Public-Private Partnership Focuses On Prevention The Obama administration has launched a new public-private collaborative effort to help prevent healthcare insurance fraud. The voluntary group includes healthcare organizations and associations, health insurers, federal and state agencies, and anti-fraud groups that together aim […]

5 Tips to Improve Intrusion Detection

5 Tips to Improve Intrusion Detection August 6, 2012 Corporate Security | Threat Assessment NIST Revising Guide on Detection, Prevention Software Intrusion detection and prevention software has become a necessary addition to the information security infrastructure of many organizations, so the National Institute of Standards and Technology is updating its guidance to help organizations to […]

Yahoo reveals security breach exposing 453,000 e-mail passwords

Yahoo reveals security breach exposing 453,000 e-mail passwords July 12, 2012 Corporate Security | Identity Theft LONDON (AP) — Yahoo Inc. said Thursday it is investigating reports of a security breach that may have exposed nearly half a million users’ email addresses and passwords. The company said it was looking into “claims of a compromise […]

NSA Chief: Cybercrime constitutes the “greatest transfer of wealth in history”

NSA Chief: Cybercrime constitutes the “greatest transfer of wealth in history” July 11, 2012 Corporate Security | Corruption | Emergency Preparedness | Managing the Risk Assessment  The loss of industrial information and intellectual property through cyber espionage constitutes the “greatest transfer of wealth in history,” the nation’s top cyber warrior Gen. Keith Alexander said Monday. U.S. companies […]