When desktops ruled the enterprise, employers may not have claimed to have absolute control over their workers' usage of technology and
data. But they surely could contain it. Today, this seems like something from a far-away age, even though it was accepted as reality just a decade ago.
Download this white...
Whether employees are negligent or malicious, IT security teams (and ultimately, CISOs) are responsible for protecting the organization
from breaches and risky behavior. But outdated, traditional security solutions don't offer enough protection from threats inside organizations. Security professionals need a new...
The launch of email, the expansion of networking and data sharing, along with the introduction of the domain name system, has created technological, innovative opportunities for individuals, businesses, and governments worldwide. However, these opportunities also presented themselves to threat actors - criminals...
Will this week's arrests of a "main target" and another suspect tied to the distributed denial-of-service extortion group known as DD4BC deter copycats from waging similar schemes? Experts weigh in.
As Art Gilliland, CEO of Skyport Systems, assesses cybersecurity in 2016, he sees distinct strengths, weakness and opportunities for the next generation of leaders. The question is: Where will we find these leaders?
When it comes to threat detection, spotting malicious insiders is one thing. They often leave a trail. But how do you protect against the accidental insider threat? Mike Siegel, VP of Products at Forcepoint, shares strategy and solutions.
In 2016, the healthcare sector faces a variety of complex legislative and regulatory issues, especially those tied to patient privacy, says attorney Kirk Nahra. For example, new rules could emerge covering the use of patient data in research.
Hackers have reportedly gained access to the accounts of dozens of Fitbit wearable fitness device users. The incident shows why device manufacturers need to get more serious about privacy by design.
The primary mission of the new Global Cyber Alliance is to identify measurable ways to mitigate cyberthreats facing the public and private sectors, says Phil Reitlinger, a former DHS official and Sony CISO, who heads the new group.
In terms of malware, 2015 will go down as the year that ransomware got big, and the organized criminals behind it got bolder. IBM's Limor Kessem discusses what to expect from advanced malware variants in 2016.
A senior cybersecurity evangelist at IBM Security, Kessem says she sees a significant new sophistication...
HealthcareInfoSecurity announces its fourth annual list of top influencers, recognizing leaders who are playing significant roles in shaping the way healthcare organizations approach information security and privacy.
To help remove perceived obstacles, federal regulators have issued new guidance on patients' rights under HIPAA to access their health records. Find out what the guidance says about the use of unencrypted email and other key issues.
The New York Attorney General's settlement with taxi-hailing platform Uber - over alleged customer data privacy violations and a delayed data breach notification - provides a best practice security template for any organization that handles customer data.
Today's enterprise infrastructure is full of blind spots that can hide malicious threats, and traditional security tools struggle to scale up to meet increased demands. How must security leaders respond? Amrit Williams of CloudPassage shares insight.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.