When it comes to cybersecurity, an organization is only as protected as its weakest link. In today’s security environment, employees are increasingly at risk to become victims of malware or phishing attacks as cybercriminals exploit gaps in security such as weak passwords or lack of an authentication strategy.
To...
It is often hard to let go of tried and tested enterprise applications: legacy applications are often intrinsically integrated into business processes, making them difficult to replace or upgrade. In fact, by 2025 Gartner expects that 90% of current applications will still be in use and have insufficient...
Millions are spent on security operations centers — in tools, processes, and people — yet we still have million-dollar problems.
It’s not from a lack of passion or effort from security analysts and responders in the SOC; it’s often due to an efficacy gap and a lack of adversary alignment. The leading...
Over his 23-year career in cybersecurity, Tom Kellermann has focused on policy, endpoints and even strategic investments. Now, in his new role as senior vice president of cyber strategy at Contrast Security, his mission is to protect code security - particularly in the public and financial sectors.
The latest edition of the ISMG Security Report discusses what went wrong for Optus in the wake of one of Australia's biggest data breach incidents, the state of code security today and the growing trend of private equity firms pursuing take-private deals.
Banks and telecoms need to make it easier for customers to sign up, buy merchandise online, take out loans, open bank accounts, and use credit cards. Processes are designed to encourage new business.
Thieves defeat these processes with high-volume attacks and synthetic identities. Without analysis, these fabricated...
SaaS applications have become essential supporting collaboration and ensuring easy access to files and folders from anywhere to keep workforces productive and connected.
Unfortunately, many organizations still believe that these tools are completely secure and make the need for backup obsolete. This simply isn’t...
Compliance isn’t exactly the most exciting side of cybersecurity. But like it or not, much of our work to secure digital assets boils down to implementing and validating checklists of controls that prevailing wisdom holds to be effective.
During this webinar, experts from RiskRecon and Cyentia Institute will...
Cyberattackers of today have numeroussophisticated ways to attack an organization's Active Directory (AD) infrastructure. This also includes the hazardous risks that come with a comprise of the company's Azure AD service.
Once attackers they get in, they can wreak some serious havoc. And then there is the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.