Steps for Women to Protect Health Information Post Roe | #itsecurity | #infosec

In the wake of the Supreme Court’s ruling in Dobbs vs. Jackson Women’s Health Organization, much has been written about how existing privacy laws, such as the Health Insurance Portability and Accountability Act (“HIPAA”), are unhelpful to women because of provisions that permit the sharing of health information (called “protected health information”…

read more

How to choose a PCaaS vendor | #itsecurity | #infosec

IT departments are embracing PC as a service to help address the challenges and complexities of deploying and managing desktops, laptops, PCs and other devices across their organizations. Several well-known vendors now offer PCaaS bundles in response to this growing demand. As this type of offering matures, organizations need to…

read more

Four encryption tools chosen to protect against quantum computer attacks | #itsecurity | #infosec

The U.S. Department of Commerce’s National Institute of Standards and Technology today said it has chosen four encryption tools designed to protect against quantum computer attacks for a planned post-quantum cryptographic standard. Of the four chosen tools, one — CRYSTAL-Kiber — offers general encryption, while the remaining three — CRYSTAL-Dilithium,…

read more

Cybersecurity Best Practices for the Audiologist : The Hearing Journal | #itsecurity | #infosec

In a highly digitized world, cybersecurity is an issue for everyone— individuals and businesses alike. This is especially true in the health care space where sensitive medical information is at risk, and so it is crucial that audiologists take the necessary steps to ensure their practices—and patients—-are protected. www.shutterstock.com. Cybersecurity,…

read more

How to find your niche in cybersecurity | #itsecurity | #infosec

“There is no right path for a security career. Even in companies large enough to have defined role-based career ladders, a security practitioner can move up, over, down and up again in remarkable ways,” wrote Helen Patton, in her book Navigating the Cybersecurity Career Path. The lack of structure, however,…

read more

US will choose encryption tools to protect us from quantum computers | #itsecurity | #infosec

The National Institute of Standards and Technology is about to reveal the next generation of algorithms that will keep our private data safe from snoopers Technology 5 July 2022 By Matthew Sparkes An artist’s impression of a future computer processor. Quantum processors might make it difficult to keep data safe…

read more

States Build Security Operations Centers Through University Partnerships | #itsecurity | #infosec

When Indiana established a security operations center in 2015, it turned to Purdue University for help. The state and the university already were working together through the Indiana Information Sharing and Analysis Center, and Indiana chose Purdue to host the SOC to share threat information and develop strategies for cybersecurity…

read more

Using the Metaverse to Connect and Protect the Natural World | #itsecurity | #infosec

(Photo by Gautam Shah) You have a meeting today in Brazil’s Atlantic Rainforest. Dense, rainy jungle surrounds you, but you and your team members remain dry. Getting everyone into a different environment has freed up their thinking and inspired a lively discussion. This is briefly interrupted when Atiaia the jaguar…

read more

Are banks quietly refusing reimbursements to fraud victims? | #itsecurity | #infosec

There are some scary reports popping up that various major financial institutions no longer credit back all fraudulent transactions, even when victims file a police report. If true, it’s a disastrous move that will painfully hurt the institutions. Let’s look a recent New York Times report on the problem: “Under a…

read more

SAM responds to ZuoRAT, the game changing attack that emphasizes the need for router protection | #itsecurity | #infosec

ZuoRAT is a sophisticated multi-tier, router fleet attack targeting home-office routers on an unprecedented scale, and is the most significant widespread attack since Mirai in 2016. Help is on the way with protection for routers and all devices connected to them by SAM TEL AVIV, Israel, July 5, 2022 /PRNewswire/…

read more

Newegg Kicks off FantasTech Presale with Hundreds of Deals with Price Protection on PC Components, Gaming PC Systems, Entertainment and Other Tech Products | #itsecurity | #infosec

CITY OF INDUSTRY, Calif.–(BUSINESS WIRE)–Newegg Commerce, Inc. (NASDAQ: NEGG), a leading global technology e-commerce retailer, today announced that its FantasTech Presale is now live with hundreds of deals on gaming PC components, PC systems, entertainment and tech-related products. The Presale will feature new deals daily and runs until July 11,…

read more

Computer Security Market Size And Forecast | #itsecurity | #infosec

New Jersey, United States – The Computer Security Market research report aims at providing a quick overview of the overall performance of the industry and significant novel trends. Important insights, as well as findings, latest key drivers, and constraints, are also depicted here. A huge array of quantitative and qualitative techniques is used by…

read more

Elbit Systems Awarded $80 Million Contract to Supply DIRCM and Airborne EW Self Protection Systems for a Country in Asia-Pacific | #itsecurity | #infosec

HAIFA, Israel, July 5, 2022 /PRNewswire/ — Elbit Systems Ltd. (NASDAQ:ESLT) (TASE: ESLT) (“Elbit Systems” or “the Company”) announced today that it was awarded a $80 million contract to supply Direct Infrared Counter Measures (“DIRCM”) and airborne Electronic Warfare (“EW”) systems for a country in Asia-Pacific. The contract will be performed…

read more

UTSA professor to use NSF grant to improve understanding between man and machines | UTSA Today | UTSA | #itsecurity | #infosec

Most research focuses on generalizing or assuming a one-size-fits-all language framework. Rios, however, will apply the grant funding to develop NLP models that are specific to geographic populations, ethnic communities and other population-specific groups. “NLP is about developing tools to understand language, but we do not have language without people,”…

read more