cybersecurity

See the following -

Congress Considers Anti-Piracy Bills That Could Cripple Internet Industries

Alex Howard | O'Reilly Radar | November 22, 2011

Imagine a world where YouTube, Flickr, Facebook or Twitter had never been created due to the cost of regulatory compliance. Imagine an Internet where any website where users can upload text, pictures or video is liable for copyrighted material uploaded to it. Imagine a world where the addresses to those websites could not be found using search engines like Google and Bing, even if you typed them in directly.

Read More »

Congress Stepping in After Reorganizations, Leadership Vacuum Leave HHS Cybersecurity Center's Fate Unclear

David Thornton | Federal News Radio | June 20, 2018

The Health and Human Services Department doesn’t want to talk about its Health Cybersecurity and Communications Integration Center. And that’s no surprise, since it doesn’t seem to know what to do with it, and no one who was responsible for standing it up is involved with it anymore. Lawmakers from the House Committee on Energy and Commerce and the Senate committee on Health, Education, Labor and Pensions sent a letter on June 5 to HHS Secretary Alex Azar pointing out some significant omissions in the department’s Cybersecurity Threat Preparedness Report, which the department is required to submit to Congress. The report is supposed to detail HHS’ responsibilities and preparedness to deal with cyber threats in health care.

Read More »

Cyber Reliant

Cyber Reliant provides quantum-resistant cyber protection of the data elements themselves. They assume the perimeter is breached and use a unique "data shredding" technology to shred voice, video, and data files along with the encryption key material. Data shreds are then dispersed across the device or cloud storage, preventing any attribution of the shreds and eliminating the recombination of identifiable data.

Read More »

Cyber Reliant Releases Mobile Data Defender - A Quantum Resistant Secure Voice and Chat solution

Press Release | Cyber Reliant | July 9, 2020

Cyber Reliant has released its early access program to specific government and commercial industry test users for quantum resistant voice and chat. Adopting quantum resistance methods is essential for ensuring full spectrum data security and privacy. Cyber Reliant's quantum resistant secure voice and chat provides a level of security such that if an attacker had unlimited computing power, as in a weaponized quantum computer, they still could not compromise the data protection methods employed by Cyber Reliant. This advancement overlays on legacy mobile devices that have chip-based True Random Number Generators already built-in to the device, and makes it possible for future device optionality and diversity, reducing expense and build complexity while increasing security to combat today and tomorrow's threats.

Read More »

Cyber-Attacks on Healthcare Institutions on the Rise: Public Health Watch Report

Brian P. Dunleavy | Contagion Live | August 2, 2017

With news this week that White House officials were fooled by a self-proclaimed “email prankster”—who posed as Jared Kushner, President Donald Trump’s advisor and son-in-law, and recently ousted Chief of Staff, Reince Priebus, during correspondences with various cabinet members—it’s worth remembering that there are cybersecurity implications for healthcare institutions as well...

Read More »

Cybersecurity Check In

Fred Trotter | The Healthcare Blog | September 13, 2016

No one likes to think about the possibility that patients might be hurt or killed as a result of cyber attacks. But all signs indicate that this is a real possibility and a serious problem. Attacks on Health IT systems such as EHRs or patient portals, electronic medical devices, or on standard healthcare digital systems can be a threat to patient safety...

Read More »

Cybersecurity Effort Launched To Strengthen Software Infrastructure

Press Release | Morgridge Institute for Research | November 1, 2012

Scientists at the Morgridge Institute for Research, Indiana University, the University of Illinois at Urbana-Champaign and the University of Wisconsin–Madison have received a $23.6 million grant..to address threats arising from the development process of software used in technology ranging from the national power grid to medical devices. Read More »

Data Breaches Through Wearables Put Target Squarely on IoT in 2017

Ryan Francis | Java World | January 3, 2017

Security needs to be baked into IoT devices for there to be any chance of halting a DDoS attack, according to security experts. Read More »

DOJ Helped AT&T, Others Avoid Wiretap Act, Promised Not To Charge Them If They Helped Spy On People

Mike Masnick | Techdirt | April 25, 2013

Want to know one reason why the feds are so interested in giving blanket immunity to anyone who helps them spy on people? Perhaps because they're already telling companies that they have immunity if they help them spy on people. Specifically, they've issued special letters of immunity, more or less helping companies like AT&T ignore the Wiretap Act. Read More »

EHNAC Applauds Health Care Industry Cybersecurity (HCIC) Task Force Report and Recommendations

Press Release | Electronic Healthcare Network Accreditation Commission (EHNAC) | June 20, 2017

The Electronic Healthcare Network Accreditation Commission (EHNAC), a non-profit standards development organization and accrediting body for organizations that electronically exchange healthcare data, today announced its support of the Health Care Industry Cybersecurity (HCIC) Task Force’s June 2 report to Congress titled Report on Improving Cybersecurity in the Health Care Industry and the recommendations therein. The Health Care Industry Cybersecurity (HCIC) Task Force was established by the Department of Health and Human Services (HHS) in March 2016 per the Cybersecurity Act of 2015, Section 405(c). EHNAC applauds HHS and the expert panel of subject matter experts on the HCIC Task Force who contributed to develop these recommendations to strengthen the privacy and security of U.S. healthcare data...

Read More »

Electromagnetic Pulse Could Knock Out U.S. Power Grid

Kedar Pavgi | Nextgov | September 12, 2012

U.S. power grids and other civilian infrastructure are not prepared for electromagnetic pulses that could result from weapons or violent space weather, according to testimony at a congressional subcommittee hearing Wednesday. Read More »

Experts Say Healthcare.gov Could Be Hacked

Danielle Wiener-Bronner | The Wire | January 16, 2014

Cyber security experts are prepared to slam government officials over the embattled Obamacare website during today's Department of Health and Human Services (HHS) hearing on its "own security concerns about healthcare.gov," citing vulnerabilities they think make the site easy to hack. Read More »

Facebook's Former Security Chief Now Works For The NSA

Rebecca Greenfield | The Atlantic Wire | June 20, 2013

About a year after Facebook reportedly joined PRISM, Max Kelly, the social network's chief security officer left for a job at the National Security Agency, either a curious career move or one that makes complete sense... Read More »

FBI Issues Healthcare Cyber-Alerts

Marianne Kolbasuk McGee | Gov Info Security | April 23, 2014

The FBI recently issued two alerts to the healthcare sector warning of increased risk of cyber-intrusions against systems and medical devices, especially as healthcare providers transition to electronic health records.  The two "private industry notices," or PINs, were issued on April 8 and April 17, with the latter being an update to the earlier alert, an FBI spokeswoman tells Information Security Media Group.

Read More »

FDA Guidance On Medical Device Cybersecurity: Too Little Too Late?

Chris Petersen | Forbes | October 3, 2014

The Food and Drug Administration (FDA) has taken an important step forward in better protecting patients and their data with the release of new guidelines on managing cybersecurity risks of medical devices this week. Despite being a step in the right direction, it unfortunately comes late...

Read More »