More Cybersecurity Articles

Cybersecurity

5 Tips to Help Mitigate Insider Theft: It starts with defining the line between personal and corporate information

Information is an extraordinarily prized corporate asset. In today’s digital age, that information is stored electronically. For example, software companies store their highly valuable intellectual property in code repositories. Healthcare companies store personal medical records in an...

Read More

Cybersecurity

The DNC Hack Was Not an Act of War: What we call it under international law should influence our response

For weeks and months, countless news cycles have been spent discussing Russia’s alleged hacking of the Democratic National Committee (DNC); the Obama administration’s decision to take steps against Russia in response to that alleged hacking; and, most recently, Michael Flynn...

Read More

Healthcare

Facing evolving cyberthreats and crippled by ransomware attacks, can hospitals ever really be prepared?

It’s happened again. On November 2, an unspecified “major” cyberincident forced three National Health Service (NHS) hospitals in the UK to shut down all planned operations and divert critically ill patients to other facilities for three days until their electronic systems could be...

Read More

Recent Cybersecurity Video