As breaches continue to cause significant damage to organizations, security consciousness is shifting from traditional perimeter defense to a holistic understanding
of what is causing the damage and where organizations are exposed. Although many attacks are from an external source, attacks from within often cause the...
One of the first steps to creating a
vendor risk management program
includes identifying what kind of
access your vendors have to your
network and where your greatest
risks lie. Unfortunately some organizations dwell on identifying those risks rather than remedying them.
Download this whitepaper to explore...
While vendor risk management has long been an area of concern for Financial Institutions, regulators are now looking for banks to do more and provide a higher level of assurance about the security practices of their vendors. But how? With regulators continuously raising the bar, one thing is clear: the vendor reviews...
Cyber risk is high on the list of the most significant risks that organizations face. Many businesses spend millions of dollars annually on people, processes, and technologies to protect themselves against cyber risk.
However, with little visibility into the success
of these investments, many organizations are still...
Blue Coat CTO Dr. Hugh Thompson speaks about the future of security, the constants that need attention, and lessons to be learned from the U.S. when it comes to writing meaningful breach notification laws.
"Ransomware is now one of the fastest growing classes of malicious software," says Fedor Sinitsyn, a senior malware analyst at the security firm Kaspersky Lab. "In the last few years it has evolved from simple screen blockers demanding payments to something far more dangerous."
Ransomware attacks fall into two...
Target is the high-profile example, but many organizations have been breached through third-party vulnerabilities. Where are the security gaps, and how can they be filled? BitSight's Stephen Boyer offers insight.
Target is the high-profile example, but many organizations have been breached through third-party vulnerabilities. Where are the security gaps, and how can they be filled. BitSight's Stephen Boyer offers insight.
The message should be as loud as it is clear: Any type of organization is a target to attackers - you don't have to be a financial services company or a merchant. It isn't just financial data that's sought; intellectual property is a rich bounty, too. And don't discount the value of a good, old-fashioned disruption,...
The identity federation standard, Security Assertion Markup Language, or SAML, enables single sign-on (SSO) and has a wide variety of uses for businesses, government agencies, non-profit organizations and service providers. With the wealth of internal and external web applications and services, federated identity is...
You've screened your candidate, hired them into the position, assigned them resources and granted them access...now what? Hope they don't rob you blind? Trust them completely? The real job has just begun, now you have to:
Translate risk levels into appropriate levels of scrutiny, the greater the access, the...
Symantec named a Leader in the The Forrester Wave: Enterprise Mobile Management, Q3 2014. Read the Forrester Research, Inc report and get in-depth expertise on the enterprise mobility market.
We recommend this analyst report for anyone evaluating enterprise mobility solutions or looking to gain a better...
Encryption and tokenization can play critical roles in preventing breaches. A recent survey conducted by HealthcareInfoSecurity confirms that the healthcare sector still has a long way to go in implementing these technologies. According to this survey, one of the top data protection steps organizations plan to take in...
Proactively managing information within financial services has never been more important - and more challenging - than it is today. Tumultuous global financial conditions have given rise to two powerful - and sometimes conflicting - objectives: 1) to address data proliferation inside their firms, and 2) to enhance...
When you're thinking about securing your data assets and web site, how do you really know the value of what you're protecting? Akamai's Terrence O'Connor shares how to determine the cost of a data breach.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.