Some regard the security risks that follow the digital revolution as acceptable trade-offs, more cautious ones are left out in the cold. The digital revolution calls for us to stay open to opportunities, and remain alert for threats. Closing oneself off to something good because of latent threats is impractical. All...
Ponemon Institute has completed its fifth year studying the cost of cyber crime to businesses around the world. The 2014 Cost of Cyber Crime Study taps the collective experience of 257 organizations in seven countries. It shows that cyber crime and its associated cost to businesses continues to rise. But there is good...
The Target security breach and discovery of the "Heartbleed" vulnerability in web encryption software taught us some important lessons about enterprise security. Analyst Robin Layland applies those lessons to establish key requirements for next-generation firewalls (NGFW). Then HP's TJ Alldridge explains how HP...
Today's workforce is highly mobile. They don't just work on laptops, they also use smartphones, tablets and other devices, many of which they brought into the enterprise themselves. In addition, these workers don't stay put. While many work from the office, most access corporate networks and data from a variety of...
Businesses have relied on endpoint defenses like anti-virus software for protection against malware. But while endpoint defenses are necessary, the headlines show they are not sufficient. Rather than relying on endpoint security alone, Gartner recommends businesses balance their investment across all four phases of...
Critical infrastructure industries vary in the sophistication of their digital defenses. But malware including Stuxnet and Flame, denial-of-service attacks on the financial industry, and other threats have made it clear that all sectors are targets.
This eBook looks at key dependencies among critical...
Security breaches in large enterprises make the headlines, but 55% of small and mid-size businesses have also experienced a data breach. This e-book examines the security challenges unique to mid-size companies and the steps you should take to protect your business.
Download this eBook to learn:
Why...
In the fight against cyber bad guys, having smart, skilled good guys is critical. But even as businesses increase their reliance on security analysts, they face a serious workforce shortage as they attempt to find and hire the talent needed. The solution: grow your own.
This business white paper coaches IT leaders on...
Your ability to spot and stop cyber attacks depends on having the right security people, processes, and technology in place. HP Security Intelligence and Operations Consulting has assessed the security programs of dozens of enterprises. The results are concerning-24 percent of companies do not meet minimum...
The security benefits of log and machine data analysis are widely accepted by CISOs and CIOs, and yet too many organizations have difficulty executing on this opportunity due to bottlenecks imposed by archaic systems and processes that manage this data. Without the right tools to give easy visibility into the data,...
Prompted by Heartbleed and other vulnerabilities, the White House is giving the Department of Homeland Security authority to conduct regular and proactive scans of federal civilian agency networks.
Undoubtedly, your network is more complex than ever. Your employees are accessing applications, using personal or work devices, but corporate risk and security factors are often ignored. Your business is a target. Are you prepared in the best possible way? The complexity of your network and infrastructure security may...
Until recently, most businesses took a traditional, perimeter-based approach to information security. The thinking was: "If we build a wall high enough, nothing will get in." That was fine until cyber criminals started looking for unguarded cracks in the masonry, forging counterfeit keys for the padlocks and tricking...
When asked to describe the current cyber threat landscape, one of the more balanced and objective answers might be that threats are "hiding in plain sight." Today's advanced cyber threats use applications as their infiltration vector, exhibit application-like evasion tactics, and act as, or
use common network...
Unix systems face special identity and access management (IAM) challenges.
Read this informative white paper to:
Learn about those issues;
Find out how to overcome them with the right practices and tools;
Enhance security, achieve compliance and improve operational efficiency.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.