READ MORE NEWS

EQUIFAX DEBT SERVICES IMPROVES THE DEBT RECOVERY PROCESS FOR CANADIAN CREDITORS

Creditors now have a new advantage when managing debt recovery with the release of Equifax Debt Services, a set of interconnected tools and services designed to make recovering money owed easier and more profitable. With this new solution, the debt recovery process from pre-collection through recoveries is fully managed by Equifax, and clients have a clear view of their customers at every step using the intuitive software dashboard.

Equifax | View Full Story


WILL REMOVING SOCIAL SECURITY NUMBERS FROM MEDICARE CARDS MAKE A DIFFERENCE? 

If you’re not yet old enough to qualify for Medicare coverage, you may not realize that Medicare cards are distinctly old-fashioned: They are simply laminated cards that openly display that most traditional (and vulnerable) of identifiers, the Social Security number (SSN). The Medicare Common Access Card Act of 2015, or H.R. 3220, aims to finally update those cards, replacing them with machine-readable, fraud-resistant “chip and pin” cards that would not reveal any personally identifiable information.

ID Experts | View Full Story


DRIVESAVERS OFFERS COMMERCIAL HIGH SECURITY SERVICE 

DriveSavers, the worldwide leader in data recovery, eDiscovery and digital forensic services, offers a Commercial High Security Service for RAID, NAS and SAN systems. The security-focused offering provides a number of additional precautions to help ensure that sensitive data is handled with the utmost care.

DriveSavers | View Full Story


TECHNOLOGIES APPRISS’ VINE SOLUTION NAMED A WINNER OF THE CITY ON A CLOUD INNOVATION CHALLENGE 

Amazon Web Services (AWS) has named Appriss as a winner of its 2016 City on a Cloud Innovation Challenge. Applications were gathered from around the world from local and regional governments or developers who are innovating for the benefit of citizens while leveraging AWS Cloud services. Winners were selected by a panel of technology experts based on the impact of their solution, likelihood of long-term success, implementation of AWS services and the potential to help other local governments solve similar challenges.

Appriss | View Full Story


IT’S TIME WE START TALKING ABOUT PRIVACY ENHANCING 

Kudos to the National Science and Technology Council and the Networking and Information Technology Research and Development Program for their June 2016 publication of the National Privacy Research Strategy (NPRS). As a company that is passionately driven to reshape the way data sharing is done globally, we were excited to see these two government groups call for a “dramatic increase in research and investment of privacy enhancing technologies.” We are big fans of privacy enhancing technologies (PETs) and have been developing those technologies for almost three years now.

XOR | View Full Story


CYBER LIABILITY EXPERT KIMBERLY HOLMES JOINS ID EXPERTS 

ID Experts today announced that Kimberly Holmes, Esq. RPLU has joined the company as Senior Vice President and Counsel, Cyber Insurance, Liability and Emerging Risks. Holmes brings extensive legal and insurance experience including creating new product lines to meet increasing demands by clients to mitigate cyber risks. In this new role, Holmes will be responsible for overseeing cyber and insurance litigation developments across all domestic industry verticals, as well as the corresponding cyber liability and enforcement landscapes impacting the insurance industry overall and particularly the health care, financial, government, education and public/private commercial industry sectors.

ID Experts | View Full Story


DRIVESAVERS OFFERS DATA RECOVERY TO VICTIMS OF HISTORIC WEST VIRGINIA FLOODING

DriveSavers, the worldwide leader in data recovery, eDiscovery and digital forensic services, announced today that the company will offer a $300 discount to victims of the recent flooding disaster in the state of West Virginia. Last month, after a relentless downpour turned into dangerous flash flooding, a state of emergency was declared across 44 counties in West Virginia. According to several reports, the rising water has forced approximately 5,200 homes and businesses to register with the Federal Emergency Management Agency (FEMA).

DriveSavers | View Full Story


WHAT YOU NEED TO KNOW: NAVIGATING EU DATA PROTECTION CHANGES – EU-US PRIVACY SHIELD AND EU GENERAL DATA PROTECTION REGULATION

If you’re an organization with trans-Atlantic presence that transmits and stores European citizen data (e.g. employee payroll & HR data, client & prospect data) in the U.S. you will want to pay attention. What we will discuss was administered under the European Union’s Data Protection Directive and a previous EU-U.S. agreement called Safe Harbor.  We will cover what happened, what’s next, new rules (and penalties) that are set to go into effect and our recommendations.

Coalfire | View Full Story


THREAT INTELLIGENCE SHARING: BUYER BEWARE 

In the first article in our two-part series on threat intelligence sharing, we discussed the benefits of threat intelligence sharing, which has been one of the hot trends in privacy and security for at least the past couple years. In it, we provided five tips to help organizations choose the right threat sharing solution. In this article, we’ll take a closer look at the other side of the story: the three greatest risks and challenges in threat intelligence sharing. Although the benefits frequently outweigh these issues, it is important to consider them carefully before investing in an external intelligence sharing solution.

ID Experts | View Full Story


WORK EMAILS AND PERSONAL WEBSITES: IT’S ABOUT MORE THAN SECURITY 

When you receive notification that your information has been compromised in a data breach, you may not be surprised. After all, data breaches happen weekly, and it’s hard to open a newspaper or browse the Internet without seeing related headlines. If your login information to a website is stolen, you will usually be notified and asked or required to change your password as soon as possible along with any other websites where you use the same or similar login credentials. However, there are some cases in which protecting yourself requires more than just a password change.

XOR | View Full Story


APPRISS JOINS WHITE HOUSE’S DATA-DRIVEN JUSTICE INITIATIVE,
RELEASES IMPORTANT STUDY ON POTENTIAL TO DIVERT LOW-RISK INDIVIDUALS 

Appriss, a leading data and analytics company, is proud to participate in the White House DataDriven Initiative by releasing a national study of incarceration data, and is actively committing to help local communities through further research and new data-driven software solutions.

Appriss | View Full Story


TIPS FROM EQUIFAX FOR BATTLING SYNTHETIC ID FRAUD 

Equifax Inc. has released numerous resources to help organizations tackle the leading identity fraud tactic – using a combination of stolen or altered information to create synthetic identities and then get access to new lines of credit and other benefits. According to Javelin, new-account fraud will have increased 44 percent between 2014 and 2018, and the trend isn’t expected to slow after that. Increasingly frequent data breaches give fraudsters easy access to consumer data that helps create seemingly legitimate identities. To explain the importance of detecting and deterring synthetic identity fraud, the white paper titled “Back to the Future: The Resurgence of New Account Fraud” details:

Equifax | View Full Story


HOW LONG SHOULD ORGANIZATIONS TAKE TO NOTIFY AFTER A BREACH? 

Whenever an organization announces that a data breach has occurred, one of the first questions is when did this take place? If the answer is more than a month or so, the follow-up questions come fast and furious: Why didn’t you detect the breach sooner? Why did it take so long to notify? Why didn’t you tell us (consumers, employees, patients, etc.) the minute you knew? How can we trust you again? What else do you know that we don’t know?

ID Experts | View Full Story


SIX YEARS LATER, PATIENT DATA STILL AT RISK FOR DATA BREACH 

Since 2010, we’ve teamed up with Ponemon Institute to conduct our seminal and annual Benchmark Study on Privacy & Security of Healthcare Data. As we compared the statistics from the first study six years ago to the most recent one, some revealing—and disturbing—trends came to light:

ID Experts | View Full Story


2016 ROBERT A. COHEN JOINS APPRISS AS PRESIDENT OF HEALTHCARE DIVISION 

Appriss Inc., a leading technology provider for risk assessment and analytics in public safety and healthcare, recently announced that Robert A. Cohen will be joining the company as President of its healthcare division. Mr. Cohen brings over 13 years of healthcare experience to Appriss with a career spanning leadership positions at McKinsey and Company, Anthem, and Healthways. In his most recent role, he served as the Market President of Tennessee for Evolent Health, a leading health IT and population health provider, where he was responsible for the operations, growth, and profitability of regional relationships.

Appriss | View Full Story


ID FACTORING: WHAT’S THE DIFFERENCE? 

Data breaches have become so commonplace that the use of good security practices and strong encryption are no longer enough for data owners to feel comfortable sharing information about their customers in order to conduct business. Because of these concerns, valid as they may be, we are seeing a tightening down on data sharing, which interrupts worthwhile efforts that could provide significant benefits to consumers and businesses. We at XOR think that’s lame. So we created a solution.

XOR | View Full Story


CYBER INSURANCE IS A MUST-HAVE, BUT DO YOU HAVE ENOUGH?

With all the threats to data, cyber insurance is as critical for organizations as collision coverage is for the parents of a licensed teen driver. According to the 2015 Ponemon Cost of Data Breach Study: Global Analysis, the average consolidated total cost of a breach increased 23 percent from two years ago, to a record-breaking $3.8 million. Many companies are using cyber insurance to help offset these breach response costs—legal counsel, forensics, notification, and identity protection services, to name a few. In addition to saving money, cyber insurance “provides the benefits of best-in-class law firms, IT firms, and other third-party teams,” says Adam Connor, a producer with Chicago-based Risk Placement Services. “The cost of retaining a preeminent law or IT firm would be wildly expensive for any size business. Insurance gives you access to these resources.”

ID Experts | View Full Story


IS IT WORTH THE EFFORT TO CREATE A CUSTOMIZED DATA BREACH RESPONSE?

Every day it seems like another data breach makes headlines. So by now there must be a proven, boilerplate approach to breach response that every organization can follow, right? Wrong. Breaches are indeed common, but there is no single, one-size-fits-all approach to breach responses. In fact, cutting corners with a standard, boilerplate response could cause more problems for the organization and the individuals affected and end up costing more than getting the response right the first time.

ID Experts | View Full Story


THE MATCHMAKER IS IN – MIKE COOK

In this week’s installment of PYMNTS’ new video/audio series The Matchmaker Is In, hosts Karen Webster and David Evans, economist, MPD Founder and co-author of the No. 1 new release on Amazon — “Matchmakers: The New Economics of Multisided Platforms,” sit down with XOR Data Exchange CEO and Founder Mike Cook to get the scoop on how the permission-based data platform works.

XOR | View Full Story


COALFIRE ACCREDITED AS A CSA STAR CERTIFICATION ASSESSOR

Coalfire, a leader in cybersecurity risk management and compliance services, today announced it has been accredited as a Cloud Security Alliance’s (CSA) Security, Trust & Assurance Registry (STAR) Certification assessor. The CSA STAR Certification is the most popular cloud security provider certification program, integrating a three-tiered provider assurance package of self-assessment, third-party audit and continuous monitoring. As an assessor, Coalfire will be responsible for rating cloud service providers’ (CSP) security measures and highlighting where gaps may exist.

Coalfire | View Full Story


HEALTHY PRIVACY AND SECURITY PRACTICES FOR TELEMEDICINE 

According to a recent study, use of telemedicine technology is expected to grow by over 18 percent annually through 2020. Twenty-nine states and the District of Columbia have laws requiring health insurers to cover telehealth visits, with similar laws pending in six more states, and the American Medical Association (AMA) listed telemedicine as one of the top 9 issues facing physicians in 2016. Growth in telemedicine is being driven by physician shortages, cost-saving initiatives, consumer convenience, and by the explosion of connected devices.

ID Experts | View Full Story


RANSOMWARE IN HEALTHCARE: WHERE THE STAKES ARE HIGHER

For healthcare organizations who are struggling with basic security, much less advanced threats like ransomware, the greeting is chilling. The newly released Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data, conducted by Ponemon Institute, found that ransomware was one of the new cyber threats for 2016. Ransomware is a type of malware that gains access to a computer system and makes either the system or the data inaccessible, then attempts to extort payment from the owner in return for returning access.

ID Experts | View Full Story


89% OF ORGANIZATIONS EXPERIENCED DATA BREACHES, ACCORDING TO NEW PONEMON REPORT

It’s a turbulent time for the healthcare industry: patient data is under siege and hospitals are big targets for cyber attacks—according to the Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data, conducted by Ponemon Institute and sponsored by ID Experts®. For the second year in a row, the study reveals that criminal attacks are the leading cause of data breaches in healthcare—up five percent to 50 percent this year. Mistakes—unintentional employee actions, third-party snafus, and stolen computer devices—are cited as the root cause of the other half of data breaches. The findings indicate that many healthcare organizations and their third parties (business associates or BAs) are negligent in the handling of sensitive patient information. They also lack the budget, people resources, and expertise to manage data breaches caused by employee negligence and evolving cyber threats, including the newest threat cited for 2016: ransomware.

ID Experts | View Full Story


STARTUP XOR OFFERS FREE PROTECTION FOR HACKED

XOR Data Exchange is offering fraud protection via its newly launched Compromised Identity Exchange platform. The data security and analytics company says it aims to provide breach victims and their customers security from identity theft as well as protection from account takeover and tax refund fraud. The role of the Compromised Identity Exchange is twofold. First, it allows organizations suffering a data breach to take proactive steps to protect their customers whose data was compormised instead of “requiring opt-in by participating consumers.” Second, it provides organizations an indication of high-risk customers and applications to quell fraud and identity theft in the future. XOR combines and analyzes data from breached records with ongoing fraud patterns.

XOR | View Full Story


NEW THREATS AND OLD PROBLEMS CAUSE TURBULENT TIMES FOR HEALTHCARE DATA, NEW PONEMON STUDY SHOWS

Criminal attacks from the outside and negligence from the inside continue to put patient data in the crossfire, the newly released Sixth Annual Benchmark Study on Privacy & Security of Healthcare Data reveals. For the sixth year in a row, data breaches in healthcare are consistently high in terms of volume, frequency, impact, and cost. Nearly 90 percent of healthcare organizations represented in this study had a data breach in the past two years, and nearly half, or 45 percent, had more than five data breaches in the same time period. For the second year, the study includes business associates (BAs)—to more accurately reflect the healthcare industry as a whole—and the impact these third parties have on the privacy and security of patient data. Data breaches for both covered entities and business associates continue to be costly. Estimates based on the results of this study suggest that breaches could be costing the healthcare industry a walloping $6.2 billion. The average cost of data breaches for covered entities surveyed is now more than $2.2 million while average cost to business associates in the study is more than $1 million.

ID Experts | View Full Story


EQUIFAX SETS NEW RECORDS WITH STRONG FIRST QUARTER 2016 RESULTS EXCEEDING COMPANY EXPECTATIONS 

“We are off to a great start in 2016 with our first quarter performance. Broad-based growth was driven by our never-ending focus on New Product Innovation, strong execution of our Enterprise Growth Initiatives, vertical market strategy, and the acquisition of Veda,” said Richard F. Smith, Chairman and Chief Executive Officer at Equifax. “This leadership team is executing at a very high level. We expect our strong growth to continue and, as a result, our financial performance for the year has strengthened from the outlook we last provided.”

Equifax | View Full Story


LIKE CHICKEN POX IN GRADE SCHOOL, IDENTITY THEFT IS SPREADING — TO CHILDREN

Identity theft isn’t just increasing — it’s spreading. In addition to identity theft of deceased individuals, we’re seeing a disturbing increase in attacks on another vulnerable population: children. Recent statistics are hard to come by, but in 2012 AllClear ID reported that children are 35 times more likely to be victims of identity theft than adults. A 2011 Carnegie Mellon CyLab study that scanned identity theft protections for over 40,000 U.S. children found that 10 percent had someone else using their Social Security number—51 times more than the identity theft rate for adults.

ID Experts | View Full Story


CAN ENCRYPTION PUT THE LOCK ON TOXIC DATA SPILLS? 

Toxic data, a term coined by Forrester Research, conjures images of oil spills and other disasters that occur when a valuable resource is breached. But what is toxic data, and what threat does this data pose for your business? In the report “Instill A Culture Of Data Security And Privacy,” Forrester analyst Heidi Shey wrote, “There are really only two types of data in your organization: 1) data that someone wants to steal and 2) everything else. The issue today is that [security and risk] pros are putting data controls in place around the data they think is most valuable and not necessarily the data that is the most valuable to those who are out to steal it—we call this toxic data.”

ID Experts | View Full Story


ID EXPERTS® LAUNCHES FIRST COMPLETE IDENTITY PROTECTION SOLUTION FOR HEALTH PLANS TO ADDRESS IDENTITY FRAUD AND DATA BREACH RISKS

In today’s world of cyber attacks and data breaches, sensitive information is readily exposed. As a result, consumers are increasingly vulnerable to financial identity theft, medical identity theft, and fraud risks. Health plans can now take preventive steps to address these potential risks and harms to their members by providing them with a complete range of identity protection, monitoring, and recovery services. ID Experts for Health Plans is a highly configurable set of offerings that includes MyIDCare™, the most-used identity protection product by the federal government; MIDAS™, the industry’s only transaction-based medical identity monitoring service; and YourResponse™, the leading data breach response service in healthcare and government.

ID Experts | View Full Story


ID EXPERTS® OPENS D.C. OFFICE FOR FEDERAL SALES AND SUPPORT 

ID Experts, the largest provider of identity protection services to the federal government, is opening a new Washington, D.C., office to be led by public-sector sales veteran Paul Norton. “Cyber-attacks on government agencies have evolved rapidly in number, severity and sophistication, with no signs of waning,” said Bob Gregg, CEO of ID Experts. “ID Experts has become the partner of choice for agencies seeking gold-standard protection for their employees and we are addressing that demand by welcoming Paul to the team, as government sales director.

ID Experts | View Full Story


MARSHFIELD CLINIC FIRST IN WISCONSIN TO INTEGRATE PRESCRIPTION MONITORING DATA INTO CLINICAL WORKFLOW

Appriss Inc., a leading technology provider for risk assessment and analytics in public safety and health care, announced that is has signed an agreement with Marshfield Clinic and facilitate easy integration of opiate prescription histories into electronic medical records (EMRs). The Appriss integration solution provides opiate prescription histories in real-time, at the point-of-care. This increased accessibility is expected to increase prescription monitoring data usage to improve patient safety and combat prescription drug abuse and diversion.

Appriss | View Full Story


3 LESSONS WE CAN LEARN FROM THE HOLLYWOOD PRESBYTERIAN MEDICAL CENTER ATTACK

The last thing the healthcare industry needs is more cybersecurity threats. Unfortunately, the industry is facing just that with the rise of ransomware attacks, in which hackers use specialized malware to take control of an organization’s or individual’s computer network or resources, demanding a ransom be paid (usually in Bitcoins) to recover the resources. The recent attack at Hollywood Presbyterian Medical Center (HPMC) provides a typical example of how ransomware works. On Feb. 5, 2016, hackers broke in and locked access to HPMC’s electronic medical record (EMR) system, effectively blocking the electronic exchange of patient information. The hackers used malware to encrypt the data and demanded that HPMC pay a ransom for the decryption key necessary to unlock the data.

ID Experts | View Full Story


COALFIRE JOINS CLOUD SECURITY ALLIANCE 

Coalfire, a leader in cybersecurity risk management and compliance services, today announced that it has joined the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. Coalfire has extensive experience advising and assessing cloud services providers, solution developers and end-users who have moved their businesses to the cloud, helping them to better understand and manage their risks by providing comprehensive assessment, testing and compliance-related services.

Coalfire | View Full Story


COALFIRE JOINS AEHIS TO STAY ON TOP OF HEALTHCARE CISOS’ BUSINESS CHALLENGES

Coalfire, a leader in cybersecurity risk management and compliance services, today announced it has joined the Association for Executives in Healthcare Information Security (AEHIS) as a foundation partner. The AEHIS serves senior IT leaders in the healthcare industry with the goal of advancing the role of the CSO/CISO through education, collaboration and advocacy in support of secure health information. As part of its involvement with AEHIS, Coalfire will utilize its experience and expertise to uncover, and advise on, business challenges for the organization’s 450+ CISO and CSO members.

Coalfire | View Full Story


THE GOVERNMENT’S RACE TO CYBERSECURITY AND THE PRIVACY VS. SECURITY DEBATE 

The federal government is on the warpath against cyber attacks. Last October, the U.S. Senate passed the Cybersecurity Information Sharing Act, or CISA. Then in December 2015, President Obama signed into law the Omnibus Appropriations Act, a $1.8 trillion funding bill, which includes the Cybersecurity Act of 2015.

ID Experts | View Full Story


COALFIRE ACHIEVES VANGUARD STATUS FOR HEALTHCARE CYBERSECURITY CONSULTING SERVICES FROM ALM INTELLIGENCE 

Coalfire, a leader in cybersecurity risk management and compliance services, today announced it has achieved The ALM Vanguard™ status by ALM Intelligence. ALM Intelligence, well known for decades of research in the management consulting sector, named Coalfire a Vanguard Leader in the firm’s new report, Consulting to Public and Private Healthcare 2015: Cybersecurity. Coalfire demonstrated market-leading depth in cyber risk capabilities and a meaningful breadth of services across a broad spectrum of healthcare risk management needs. In the report, Coalfire was recognized for its strong capability ratings across cybersecurity IT and data management, governance, compliance, healthcare processes and analytics.

Coalfire | View Full Story


HOW TO PROTECT TREASURE TROVE OF HEALTHCARE DATA AGAINST SOPHISTICATED CRIMINALS 

Criminals want your organization’s healthcare data, and are launching ever-more aggressive, targeted attacks to get it, according to our recent webinar, Criminal Access to Healthcare Information: What Can Be Done to Better Protect PHI?, held on January 19, 2016. Sean Hoar, a partner with Davis Wright Tremaine in its privacy and security practice, and Richard Goldberg, chief of the Economic Crime Section of the U.S. Attorney’s Office for the Eastern District of Pennsylvania, discussed current threats to the security of healthcare data, which is a “treasure trove” of information—PII, PHI, PCI-related data, and possibly proprietary information.

ID Experts | View Full Story


BEWARE THE MILLENNIALS: NEW YEAR BRINGS NEED FOR SECURITY MEASURES

2016 is here: A year in which more and more millennials will be punching the employee time clock. In fact, millennials (ages 18–34) comprise about one-third of the U.S. workforce and have already surpassed Generation X to become the largest generation of American workers.

ID Experts I View Full Story


DRIVESAVERS EXPANDS PARTNERSHIP WITH KINGSTON TECHNOLOGY TO DELIVER SUPERIOR CUSTOMER SERVICE AND SSD DATA RECOVERY IN EMEA COUNTRIES

DriveSavers, the worldwide leader in data recovery, eDiscovery and digital forensic solutions, today announced an expanded partnership with Kingston Technology Company, Inc. through its KingstonCare customer satisfaction program.

DriveSavers | View Full Story


MISSING LAPTOPS, DRIVES EXPOSE THOUSANDS OF PATIENTS’ MEDICAL DATA

In three recent cases, lost or stolen laptops and hard drives may have exposed thousands of patients’ protected health information (PHI). New York’s St. Luke’s Cornwall Hospital (SLCH) recently announced that a USB drive was stolen from a restricted area of the hospital on October 31, 2015, resulting in the potential exposure of some patients’ PHI.

ID Experts I View Full Story


WHAT STAR TREK CAN TEACH YOU ABOUT HELPING YOUR HEALTHCARE CLIENTS SECURE PATIENT DATA

Remember the hover boards in the “Back to the Future” movies–those levitating skateboards that characters in the films used to get around? As you’ve no doubt seen if you’ve stepped outside your house lately, more than 25 years after they first appeared in those movies, hover boards are finally here—in the real world—sort of. (They unfortunately don’t actually levitate.)

ID Experts I View Full Story


TAXACT NOTIFIES CUSTOMERS OF POSSIBLE DATA BREACH

Add TaxAct to the companies notifying customers of a possible data breach. The tax preparation provider says outsiders gained “inappropriate access” to an unspecified number of customers’ records. “We have no evidence that any TaxAct system has been compromised and believe the third party used username and password combinations obtained from sources outside of our system,” the company said in a letter to its customers. The full text of the letter is available on the California Attorney General’s website.

ID Experts I View Full Story


TOP PREDICTIONS FOR 2016: PRIVACY AND SECURITY

Coalfire, a leader in cyber security risk management and compliance services, today announced Luke McOmie and Ryan Jones have joined the company to lead its Labs division. Each bring more than 20 years of cybersecurity and penetration testing experience at a variety of organizations both internally at enterprises and service providers. McOmie joins Coalfire as the director of penetration testing; Jones is the Lab’s managing director.

ID Experts I View Full Story


Old School Computing Heroes Save Gene Roddenberry’s Missing Files

Gene Roddenberry’s “lost” files have been restored again, just in time for the 50th anniversary of the show. But it wasn’t that they were truly lost. It’s that they were virtually unreadable by modern computers. Unless you’ve delved deep into retrocomputing, CP/M probably doesn’t mean much. But the operating system, short for Control Program for Microprocessors, was an early operating system that was eventually driven to extinction by MS-DOS. The last CP/M release came in 1983, and since then it’s faded into obscurity, with few copies existing today.

DriveSavers I View Full Story


Westminster Based Coalfire Establishes Fund to Honor Late CEO

Coalfire Systems, a Westminster-based cybersecurity company, and The Denver Foundation announced on Wednesday the creation of a charitable fund honoring Coalfire co-founder and CEO Richard Dakin, who died while hiking in June. The fund will support nonprofit organizations that focus on cybersecurity education.

Coalfire I View Full Story


EQUIFAX WORKFORCE SOLUTIONS HONORED WITH MISSOURI CHAMBER OF COMMERCE AND INDUSTRY FAST TRACK AWARD

Equifax Workforce Solutions, a leader in human resource, analytics and verification services, and a business unit of Equifax Inc. (NYSE:EFX), today announced it has been named a winner of the 2015 Fast Track Award by the Missouri Chamber of Commerce and Industry, highlighting the company’s impressive record of continued growth. Dann Adams, president of Equifax Workforce Solutions, accepted this prestigious award during the Missouri Chamber 2015 Annual Meeting and Awards Banquet, held on Thursday, November 19, 2015 at the Intercontinental Kansas City.

Equifax | View Full Story


EQUIFAX HELPS SET NEW INDUSTRY STANDARD FOR AUTOMOTIVE DEALER APPLICATION AND CREDENTIALING

Automotive dealers can now apply and be approved for access to Equifax consumer insights data in a matter of hours thanks to a new, streamlined onboarding platform. Leveraging technologies from DocuSign and Salesforce.com, along with its own proprietary technology and process innovation, Equifax has helped transform dealer credentialing from a long, paper-intensive procedure spanning several days or weeks into a more seamless, all-digital transaction that delivers approvals within hours of receiving the necessary documents from dealers.

Equifax | View Full Story


COALFIRE RANKS 15TH ON CONSULTING MAGAZINE’S LIST OF THE FASTEST GROWING FIRMS 

Coalfire, a leader in cyber security risk management and compliance services, today announced it was named to Consulting Magazine’s list of the fastest growing consulting firms in United States. It was the only Colorado-based company on the list. Selection criteria for the Fastest Growing Firms is based solely upon percentage of increased revenue from 2011-2014. With Coalfire’s growth rate at nearly 188 percent, the company ranked No. 15 on the list of 50 companies.

Coalfire | View Full Story


PALMETTO HEALTH TAKES STEPS TO PREVENT PRESCRIPTION DRUG ABUSE

The Centers for Disease Control and Prevention (CDC) calls the misuse and abuse of prescription medications a nationwide epidemic. According to the CDC, 44 people in the United States die from overdose of prescription painkillers every day. To help curb prescription drug abuse, Palmetto Health, Columbia, South Carolina, along with Appriss Inc., a leading technology provider for data, risk assessment and analytics solutions, and Cerner, a global leader in health care technology, have collaborated to assist clinicians in making better prescribing decisions for controlled substances.

Appriss | View Full Story


ADVERTORIAL: APPRISS: PROVIDING SOLUTIONS TO KEEP COMMUNITIES SAFE

At Appriss, our mission is to keep communities safe and informed. We’ve been delivering technology solutions to government and commercial entities for the past 21 years. VINE (Victim Information and Notification Everyday), our flagship product, is the nation’s leading automated victim notification solution. VINE tracks the custody status of offenders in jail or prison and notifies victims and other registered users by phone, email or text when the inmate is released. VINE is now being used in 47 states covering more than 3,000 communities.

Appriss | View Full Story


Colorado cybersecurity firm plans expansion, will hire hundreds

Colorado cybersecurity firm Coalfire Systems Inc. plans to hire hundreds of new employees over the next year and expand its local offices after landing well-connectors majority owners.

The 14-year-old company employs nearly 350 people at its 14 locations in the U.S. and Europe today. The majority of its employees work in Denver-area offices in Westminster and Centennial.

Coalfire I View Full Story


Cyber Data Analysis Requires Multidimensional Approach

The typical all-source intelligence analyst must generate products that result from the fusion and correlation of structured and unstructured text reporting with sensor and imagery data sources. This process is complicated by the explosion of information on the Internet and the international community’s increasing use of social media to share ideas and coordinate activities, which has resulted in a larger data pool.

Dynology I View Full Story


Pivotal Payments’ FlexPoint takes the POS out of PCI Compliance Scope

Pivotal Payments, a leading provider of technology-driven global payment processing solutions, today released a white paper written by Coalfire, a leader in cybersecurity risk management and compliance services, describing how the FlexPoint integrated payments platform allows developers to achieve an “out of scope” solution for their point of sale (POS) applications.

Coalfire I View Full Story


CONTINUOUS INSIDER RISK MANAGEMENT APPLICATION RELEASE

ClearForce, a leading edge provider of innovative information technology applications to business and government, announces the release of the ClearForce™ continuous insider risk management application. ClearForce provides actionable information that protects both individuals and organizations.

ClearForce | View Full Story


Dynology Supports ClearForce at 2015 Cybersecurity CAMPAIGN

Dynology today announced its support of the ClearForce activity based intelligence program for reducing the risk of insider threats. ClearForce today launched its first-of-its-kind platform for continuous assessment of corporate and government insider risks.

Dynology I View Full Story


CYBER DATA ANALYSIS REQUIRES MULTIDIMENSIONAL APPROACH

The typical all-source intelligence analyst must generate products that result from the fusion and correlation of structured and unstructured text reporting with sensor and imagery data sources. This process is complicated by the explosion of information on the Internet and the international community’s increasing use of social media to share ideas and coordinate activities, which has resulted in a larger data pool.

Dynology I View Full Story


DYNOLOGY ANNOUNCES START OF FOURTH YEAR OF WEB BASED TRAINING DEVELOPMENT

Dynology is pleased to announce that its support of web based content development for the DoD Comptroller has entered a fourth year of effort. The original Web Based Content Development effort, awarded to prime contractor DP George in September 2012, resulted in the conversion of more than 150 hours of classroom instruction to web based content. The courses are certified by the National Association of State Boards of Accountancy (NASBA), and fully Sharable Content Object Reference Model (SCORM) and Section 508 compliant.

Dynology | View Full Story


DRIVESAVERS CELEBRATES 30 YEARS OF DATA RECOVERY SUCCESS AND INNOVATION

DriveSavers, the worldwide leader in data recovery, eDiscovery and digital forensic services, today celebrates 30 years of rescuing data from physically damaged, mechanically failed, virus-infected storage devices and corrupt data files.

DriverSavers | View Full Story


DRIVESAVERS OFFERS DATA RECOVERY RELIEF TO VICTIMS OF RAGING CALIFORNIA WILDFIRES

DriveSavers, the worldwide leader in data recovery, eDiscovery and digital forensic services, announced today data recovery assistance to victims of the destructive wildfires burning in the state of California. Three major fires raging in California have destroyed more than 277,000 acres and left up to 1,000 structures flattened. DriveSavers will offer $500 off data recovery services and will also donate $500 per recovery to victims who have lost homes from the deadly fires.

DriveSavers I View Full Story


Coalfire Investing in the U.K. for European Growth; New Investment Broadens Global Cybersecurity Reach

Coalfire, a leader in cybersecurity risk management and compliance services, today announced further international growth with the establishment of its European headquarters in Manchester, England.

Through a recent major investment from the Carlyle Group and the Chertoff Group, Coalfire is well-positioned to meet the demand for global, independent, cyber-risk advisory, compliance assessment, technical testing and software services in support of the continued adoption of cloud and mobile technologies. The cybersecurity talent shortage is an issue for organisations of any size, and Coalfire is poised to solve the need for outsourced cybersecurity services and technologies.

Coalfire I View Full Story


XOR Delivers Online Access to Small Business Fraud, Credit, and KYC Insight

XOR Data Exchange (XOR), a data analytics company that creates permission-based data exchanges, today announced online accessibility for its Small Business Data Exchange. The XOR Small Business Data Exchange facilitates the sharing of proprietary data about even the smallest of small businesses to help financial services institutions, telecommunications providers, marketplace lenders, and others reduce fraud and credit risk while complying with Know Your Customer (KYC) regulatory requirements.

XOR I View Full Story


Bluewater News – Bluewater International CEO and Coalfire Board Member, Norm Willox proud to announce strategic acquisition and partnership with The Chertoff Group and The Carlyle Group. 

Coalfire, a leader in cybersecurity risk management and compliance services, today announced that it has received a strategic investment from The Carlyle Group (NASDAQ: CG) and The Chertoff Group. With its new investment partners and existing investment partner, Baird Capital, Coalfire is well-positioned to double its market share globally by 2017 through the growth of its cyber risk advisory, compliance assessment, technical testing and software services. The investment is being directed to rapidly expand its market presence domestically and internationally, recruit top talent and enhance its Labs services and software platform.

Coalfire I View Full Story


DYNOLOGY ANNOUNCES CONTRACT AWARD

Dynology is pleased to announce that it is part of the winning team under the Technical Engineering Analytical Management Support (TEAMS) Blanket Purchase Agreement (BPA) to support the Office of the Under Secretary of Defense. Led by co-primes The Red Gate Group and PriceWaterhouseCoopers, the team was notified by The Washington Headquarter Services (WHS) of award although the official Government announcement is forthcoming, pending notification of losing bidders.

Dynology | View Full Story


Bluewater International News – Portfolio company ID Experts wins $133 million dollar award to provide identity theft protection services for 21.5 million federal employees.

The Office of Personnel Management had awarded a contract to Identity Theft Guard Solutions to provide identity and credit protection services to federal employees in the wake of this summer’s massive network hack, according to acting director Beth Cobert. She announced the award during a conference call with reporters on Sept. 1. The company is better known as I.D. Experts.

ID Experts I View Full Story


Bluewater International Portfolio News- Austin, TX based XOR raises 4 million in Series A, and Bluewater CEO Norm Willox accepts board role.

XOR Data Exchange Inc., an Austin data analytics company, has completed a $4.2 million Series A round of funding to build more data exchanges for potential customers.

The company raised the capital, which follows a $1.8 million seed financing earlier this year, from 11 investors, according to a Tuesday filing with the U.S. Securities and Exchange Commission.

XOR Data Exchange I View Full Story


TRUST NO ONE: A BETTER WAY TO CLOSE THE SECURITY GAP?

Agencies are increasingly turning to predictive analytics to root out fraud, but those aren’t the only tools being used to spot and control anomalous behavior. New identity security tools are emerging to help enterprises that might be victimized in fraud schemes enabled by insiders or attackers using insider credentials. Those users have been at the center of several recent high-profile attacks.

InfoZen I View Full Story


APPRISS ACQUIRES THE RETAIL EQUATION TO STRENGTHEN EFFORTS IN FIGHTING FRAUD AND MITIGATING RISK

Appriss Inc., a leading provider of data, risk assessment and analytic solutions for government, health information and the consumer industries, today announced it has acquired The Retail Equation, a provider of predictive analytics for retail businesses.  Norwest Venture Partners, previous majority owner of The Retail Equation, will continue to support the company through its next phase of growth, by investing a significant portion of proceeds into the combined entity.

Appriss I View Full Story


Everything is hackable: Cars, credit cards, U.S. national security now

Here are two unavoidable facts of modern life: every computerized device is vulnerable to malware, and anything connected to the Internet can be hacked. In other words, any “smart” device (read: anything computerized and connected) is vulnerable — including smartphones, smart TVs, smart thermostats, smart cameras, smart home security systems and smart cars.

Indeed, the vehicle hacking problem is bad enough that researchers already rate new cars not only according to their fuel efficiency or safety records, but also by how easily hackers might gain control of their key systems, including steering and brakes.

ID Experts I View Full Story


A Privacy-Enabled Data Exchange that Expands Analytics Uses in Fraud, Credit Risk and Beyond

The virtue of analytics is its efficiency. It matches up buyer preferences with seller production.

It enables a dozen brands of spaghetti to appear on your grocer’s shelf: thick vs. thin, Sicilian vs. Napolitano, elegant vs. budget, regular vs. organic, generic vs. your Italian Grandma’s authentic style.

But the soggy noodle of analytics is privacy. It doesn’t matter to me if my local grocer takes note of the spaghetti brand I buy, but I flinch at the thought that my ISP or service provider is scanning my personal emails.

XOR Data Exchange I View Full Story


Experts warn 2015 could be ‘Year of the Healthcare Hack’

Caroline Humer & Jim Finkle – Global Post

Security experts are warning healthcare and insurance companies that 2015 will be the “Year of the Healthcare Hack,” as cybercriminals are increasingly attracted to troves of personal information held by U.S. insurers and hospitals that command high prices on the underground market.

Anthem Inc, the No. 2 U.S. health insurer, last week disclosed a massive breach of its database containing nearly 80 million records, prompting investigations by state and federal authorities. That hack followed a breach last year at hospital operator Community Health Systems, which compromised some 4.5 million records.

ID Experts I View Full Story


Anthem breach: Get set for medical identity fraud

Anthem has confirmed that its massive data breach has affected about 13.5 million Californians, profoundly illustrating the risks consumers face with the wide distribution of their medical information.

Most coverage of the Anthem breach has provided conventional advice: Check your bank statements and credit cards, change your password, order your credit report, etc. That is all good advice, but it completely ignores the unique risks of medical identity theft and fraud.

ID Experts I View Full Story


Bluewater International Adds XOR Data Exchange to Strategic Portfolio of Cyber and Information Firms

XOR joins elite group of clients and strategic partners addressing cyber security, information sharing and privacy

Annapolis, MD — February 24, 2015 Bluewater International, a leader in corporate growth management, is pleased to announce the addition of XOR Data Exchange, the nation’s first patent-pending permission-based data exchange, to its portfolio of elite clients and strategic partners addressing areas of cyber security, information sharing and privacy.

PRWEB I View Full Story


In 2015 the Cost of Cybersecurity and Risk Management Will Remain on Track to Double

Adds Bluewater International CEO and Founder Norm Willox to board of directors

(December 9, 2014 – Denver, CO) – “As 2014 ends, it is clear this was the year everything changed in the world of information security,” said Rick Dakin, Coalfire’s CEO and chief security strategist. “As high-profile data breaches were announced one after another, consumers stopped believing companies took protecting their information seriously.

Coalfire I View Full Story


Compliance Cloud from EasyStreet Delivers Tailored Solutions

(November 19, 2014 – Portland, OR) – EasyStreet® Inc. increases momentum for its Compliance Cloud which allows clients to securely transact business while meeting industry-specific regulatory and governance requirements.

Coalfire I View Full Story


TAXACT NOTIFIES CUSTOMERS OF POSSIBLE DATA BREACH

Add TaxAct to the companies notifying customers of a possible data breach. The tax preparation provider says outsiders gained “inappropriate access” to an unspecified number of customers’ records. “We have no evidence that any TaxAct system has been compromised and believe the third party used username and password combinations obtained from sources outside of our system,” the company said in a letter to its customers. The full text of the letter is available on the California Attorney General’s website.

ID Experts I View Full Story


Software that Simplifies the Management of Security and Privacy Incidents Involving Regulated Data

(September 19, 2014 – San Jose, CA) – Security and privacy incidents have become an everyday occurrence in industries that hold sensitive customer and patient information—referred to as regulated data. Managing data breach risks and staying in compliance with breach laws can be overwhelming, time-consuming, and prone to human error. Privacy, security, and compliance officers are turning to RADAR™, enterprise SaaS software from ID Experts, that brings simplicity and efficiency to the management of privacy and security incident response. As a result, the IAPP has selected RADAR as the winner of the HP-IAPP Privacy Innovation Award for Technology.

ID Experts I View Full Story


CaaS Solution Helps PCI-, HIPAA-driven Companies Reduce Risk By Addressing Compliance

(September 8, 2014 – Dallas, TX) – To help businesses protect their data and exceed PCI, HIPAA, and other regulatory requirements, secure cloud leader FireHost has announced the most complete compliance-as-a-service (CaaS) offering, making the fast-growing company the only cloud provider in the industry to deliver such a service.

Customers using FireHost CaaS have the unique ability to host critical data while addressing compliance requirements within the industry’s most secure cloud infrastructure — all without buying or integrating appliances or software. FireHost CaaS addresses gap analysis, remediation, auditing, security and compliance monitoring, incident response, and forensics. Businesses can offload compliance and security work to full-time experts, which is important as attack methods and regulatory requirements change.

ID Experts I View Full Story


GRC Firm Available to Provide Healthcare, PCI and Other Compliance and Security Services to Texas State and Local Entities

DALLAS – June 23, 2014 – Coalfire Systems, Inc., an independent information technology Governance, Risk and Compliance firm, today announced its selection as a Listed Vendor by the State of Texas Department of Information Services (DIR).

With Texas DIR Listed Vendor status, Coalfire is now able to provide State of Texas entities and other State and Local government agencies with IT Governance, Risk Management and Compliance (IT GRC) services. Coalfire’s Listed Vendor status reduces potentially lengthy contract negotiation time in order to expedite critical security and compliance needs and also provides discounted pricing for state and local entities throughout Texas.

Coalfire I View Full Story


Cyber-security protection big priority for security professionals

A cyber threat response drill for healthcare organizations conducted this past month highlighted some serious challenges facing healthcare security professionals.

Government Health IT I View Full Story