Publication: Government Info Security

First reported Oct 23 2014 - Updated Oct 24 2014 - 1 reports

ONC's DeSalvo to Focus on Ebola Response

Takes on New Role of Acting Assistant Secretary of HealthKaren DeSalvo, M.D.Karen DeSalvo, M.D., who has headed up the Office of the National Coordinator for Health IT since January, is leaving the position to help with the Department of Health and Human ... [Published Government Info Security - Oct 23 2014]
First reported Oct 24 2014 - Updated Oct 24 2014 - 1 reports

Ransomware Attacks Subvert Ad Networks

Malicious Advertising Infects Yahoo, Match.com, AOL UsersSecurity vendor Proofpoint warns in a new report that a "malvertising" campaign has been launching ransomware attacks against users of numerous high-profile websites, including search site Yahoo, ... [Published Government Info Security - Oct 24 2014]
First reported Oct 24 2014 - Updated Oct 24 2014 - 1 reports

CA Supreme Court Declines Breach Cases

No Proof in Either Case of Unauthorized Data ViewingThe California Supreme Court has declined to hear appeals in data breach class action lawsuits against Sutter Health and Eisenhower Medical Center. The action lets stand previous court rulings that determined ... [Published Government Info Security - Oct 24 2014]
First reported Oct 23 2014 - Updated Oct 23 2014 - 1 reports

What Would the Original CISO Do?

Steve Katz on What It Takes To Be a CISO TodaySo, in this post-Target world of retail breaches, advanced threats and polymorphic malware, what would the first CISO want to say to today's generation of security leaders - besides "Good luck?"Steve Katz, ... [Published Government Info Security - Oct 23 2014]
First reported Oct 23 2014 - Updated Oct 23 2014 - 1 reports

OIG Cites FDA Network Vulnerabilities

Agency Claims It Has Remediated the IssuesAn audit last year showed that the Food and Drug Administration had cybersecurity vulnerabilities on its computer network, according to a new report by the Department of Health and Human Services' Office of the ... [Published Government Info Security - Oct 23 2014]
First reported Oct 22 2014 - Updated Oct 22 2014 - 1 reports

Medical Device Security: Higher Profile

Medical Device Security: A Higher ProfileWhite House Official Highlights Issue; Investigation Under WayWhite House Cybersecurity Coordinator Michael Daniel says medical device manufacturers need to do a better job of baking cybersecurity into the development ... [Published Government Info Security - Oct 22 2014]
First reported Oct 22 2014 - Updated Oct 22 2014 - 1 reports

Windows Warning: Zero-Day Attack

New Exploit Linked to Russian 'Sandworm' HackersMicrosoft is warning Windows users that they're vulnerable to a new zero-day flaw that attackers have been exploiting to remotely execute arbitrary code."At this time, we are aware of limited, targeted attacks ... [Published Government Info Security - Oct 22 2014]
First reported Oct 21 2014 - Updated Oct 21 2014 - 1 reports

How Tom Carper Sees FISMA Bill Passing

Senator Describes Building Trust with Republican CounterpartSen. Tom Carper chairs the Senate panel with IT security oversight.Sen. Tom Carper, the Delaware Democrat who chairs the Senate Homeland Security and Governmental Affairs Committee, says it's ... [Published Government Info Security - Oct 21 2014]
First reported Oct 17 2014 - Updated Oct 17 2014 - 1 reports

FBI Director Ignites Encryption Debate

Comey: Apple's New Mobile OS Stymies Law EnforcementFBI Director James Comey discusses encryption at the Brookings Institute.FBI Director James Comey says he wants Congress to update a 20-year-old law to give law enforcement authorities access to the ... [Published Government Info Security - Oct 17 2014]
First reported Oct 17 2014 - Updated Oct 17 2014 - 1 reports

Fighting the Globalization of Cybercrime

Report: 'Cybercrime As a Service' on the Rise"Cybercrime as a service" and the globalization of attacks are two of the trends noted by cyber-intelligence firm Group-IB in its third annual High-Tech Crime Report. Now, security firms and law enforcement ... [Published Government Info Security - Oct 17 2014]
First reported Oct 16 2014 - Updated Oct 17 2014 - 1 reports

Apple Pay Will Be Available Oct. 20

Apple's new payments platform, Apple Pay, will launch on Monday, Oct. 20.The platform enables users to pay for items using several Apple mobile devices, including the newly released iPad Air 2 and iPad Mini 3, both of which now feature Touch ID, a built-in ... [Published Government Info Security - Oct 16 2014]
First reported Oct 16 2014 - Updated Oct 16 2014 - 1 reports

IGs: Federal Cloud Data Seen at Risk

IGs: Weak Enforcement Puts Fed Cloud Data at RiskAgencies Can't Determine If Providers Furnish Adequate SecurityA council of federal agencies' inspectors general says government data stored on the servers of cloud service providers could be at risk because ... [Published Government Info Security - Oct 16 2014]

Quotes

...Firewall vendor Palo Alto Networks reports that since Sept. 30, it's spotted 84 new Cryptowall 2.0 variants. These variants target consumers "primarily through e-mail attachments but also through malicious PDFs and Web exploit kits" it says. Those malicious PDFs would target users via phishing attacks, meaning the malicious documents would arrive attached to fake but real-looking...
...privacy rights in their health information," says attorney Kathryn Coburn of law firm Cooke Kobrick & Wu LLP, which is not involved in either case. "The California appellate court noted in the Eisenhower case that the circumstances of the breach must include 'unauthorized viewing' in order for the plaintiff to recover nominal damages. HIPAA doesn't even allow for a private right of action by the consumer."
...New Orleans healthcare system," former HHS secretary Kathleen Sebelius said last December in announcing her appointment of DeSalvo as ONC chief. "Following Hurricane Katrina, for example, she led projects to increase access to care by augmenting the city's neighborhood-based medical homes for low income, uninsured and other vulnerable populations in the New Orleans area."
"It comes down to the data," Katz says. "How effectively are you protecting access to data? How effectively can you ensure the integrity of that data? And how effectively can you ensure the availability of that data?"

More Content

All (29) | News (29) | Reports (0) | Blogs (0) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Ransomware Attacks Subvert Ad Networks [Published Government Info Security - Oct 24 2014]
CA Supreme Court Declines Breach Cases [Published Government Info Security - Oct 24 2014]
ONC's DeSalvo to Focus on Ebola Response [Published Government Info Security - Oct 23 2014]
What Would the Original CISO Do? [Published Government Info Security - Oct 23 2014]
OIG Cites FDA Network Vulnerabilities [Published Government Info Security - Oct 23 2014]
Medical Device Security: Higher Profile [Published Government Info Security - Oct 22 2014]
Windows Warning: Zero-Day Attack [Published Government Info Security - Oct 22 2014]
How Tom Carper Sees FISMA Bill Passing [Published Government Info Security - Oct 21 2014]
Fighting the Globalization of Cybercrime [Published Government Info Security - Oct 17 2014]
FBI Director Ignites Encryption Debate [Published Government Info Security - Oct 17 2014]
Apple Pay Will Be Available Oct. 20 [Published Government Info Security - Oct 16 2014]
IGs: Federal Cloud Data Seen at Risk [Published Government Info Security - Oct 16 2014]
Michael Daniel Defends Himself, Sort Of [Published Government Info Security - Oct 13 2014]
'Mayhem' Malware Exploits Shellshock [Published Government Info Security - Oct 10 2014]
More Execs Could Face Fraud Charges [Published Government Info Security - Oct 08 2014]
Beyond Chase: 9 More Banks Breached? [Published Government Info Security - Oct 06 2014]
Hackers Exploit U.S. Army, Microsoft [Published Government Info Security - Oct 01 2014]
Stopping Cybercrime: The Role of Malware Detect... [Published Government Info Security - Sep 30 2014]
From ISIS to FISMA, A Conversation [Published Government Info Security - Sep 29 2014]
Shellshock Bug: How to Respond [Published Government Info Security - Sep 26 2014]
Apple iPhone 6 Touch ID Hacked [Published Government Info Security - Sep 24 2014]
Germany's Cybersecurity Law: EU Impact [Published Government Info Security - Aug 22 2014]
Why Global Internet Governance is Tough [Published Government Info Security - Jul 08 2014]
Internet Explorer Bug: Steps to Take [Published Government Info Security - Apr 29 2014]
Cybersecurity Drill: Lessons Learned [Published Government Info Security - Apr 21 2014]
Heartbleed Causes Breach in Canada [Published Government Info Security - Apr 14 2014]
New Arrests in $45 Million ATM Cash-Out [Published Government Info Security - Nov 21 2013]
Banks Skeptical About DDoS Ceasefire [Published Government Info Security - Jan 30 2013]
4 Banks Respond to DDoS Threats [Published Government Info Security - Dec 12 2012]
1
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.