For healthcare providers and payers, finding new ways that allow consumers to transact with confidence in any channel – and on any device - while maintaining the security of payment and personally identifiable information (PII) is vital for ensuring they – and the patients they serve - are protected from...
Get Mandiant’s take on building security into AI systems, best practices for effective crisis communications during an incident, mitigating risks to IoT and edge network infrastructure, and much more in this latest edition of The Defender’s Advantage Cyber Snapshot. Once again we’re going beyond incident...
Google is named a leader achieving the highest possible score in 15 criteria including Cyber Threat Intel, Analyst Tradecraft Expertise and Innovation. When it comes to detecting and responding to cyber threats, you can’t cut corners. Flagging indicators of compromise and phishing alerts isn’t enough to protect...
Protected Health Information (PHI) includes medical histories, lab results and vital signs, as well as addresses, social security numbers, birth dates, billing and payment card data, and other personally identifiable information (PII).
It is no wonder the healthcare industry has become a favourite target for hackers,...
The steps an organization takes to inform, engage and safeguard their stakeholders during a cyber incident significantly impacts a successful business recovery and long term brand reputation. The stakes are rising for victim organizations from threat actors employing nontechnical offensive techniques using the public...
Post pandemic, remote and hybrid workforce models have become the new norm. However, this wholescale shift to remote work is providing low hanging fruit for hackers’ intent on taking advantage of vulnerabilities created when organizations rush to virtually connect remote workers to the workplace.
Unfortunately,...
Improve your organization’s cyber readiness so you can confidently respond to the latest threats. The Google Cloud Cybersecurity Forecast 2024 provides insights on the year ahead from experts on the frontlines of the latest attacks. Read the report to learn what 2024 holds for generative AI-enabled security,...
According to the Pew Research Center, 81% of Americans say the risks of data collection outweigh the positives. And 72% say they can see little-to-no benefits from these data processing activities. With statistics like these, preserving your customers’ freedom of choice and control over their data can’t remain a...
Ready to learn more about industry trends across security operations? The SANS 2023 SOC Survey looks at the latest capabilities, architecture and technology of the modern security operations center (SOC), including how your security team stacks up against the competition.
Download a free copy of Splunk-sponsored...
The EU-US Data Privacy Framework (DPF) was introduced by the European Commission to ensure the protection of Europeans’ data when transferring to eligible companies in the US.
Download this comprehensive guide to learn more about:
Lawful data transfer mechanisms, including standard contractual clauses and transfer...
Global demand for qualified cybersecurity professionals has never been greater. Research shows there’s a shortage of nearly 4 million cybersecurity workers compared to the number of roles that need to be filled.
This whitepaper will walk you through some of the common challenges newcomers to cybersecurity face...
Improving IT operations can be a challenging task for organizations to handle.
With the ever-changing technology landscape, there is a continuous demand to keep systems updated and secure. However, meeting these demands can prove challenging. As organizations grow and their IT infrastructure becomes more...
Conceptually, PIAs and DPIAs are the same, but there are notable distinctions between the two.
Download this comprehensive eBook to learn how to:
Understand the requirements and terminology;
Build the PIA and PTA questionnaires;
Embed the PIA within the organization
Whether you’re new to privacy or have been working in the space for some time, it can be a confusing place. There are strange terms, countless acronyms, hundreds of laws – many of which overlap – and multiple reasons to justify the importance of privacy.
Download this eBook to learn more about::
Explanations...
In the new The Forrester Wave™ for Privileged Identity Management, Q4 2023, Forrester evaluates the most significant vendors and how they measure up.
Secure every identity with Intelligent Privilege Controls™ technology from CyberArk. Keep your business, its most privileged users and valuable assets secure....
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.