Microsoft accidentally internet-exposed for three weeks 250 million customer support records stored in five misconfigured Elasticsearch databases. While the company rapidly locked them down after being alerted, it's an embarrassing gaff for the technology giant, which has pledged to do better.
For the FinServ industry, change is the only constant. New regulations are popping up everyday, along with customer expectations, competition, security threats or just, technology.
The FinServ industry must re-imagine existing data analytics strategies to capitalize on product innovation, risk optimization, improved...
IBM has been named a Leader in Gartner's Magic Quadrant for Data & Analytics Services. According to the report, by 2022, 90% of corporate strategies are expected to view information as a critical enterprise asset, and analytics as an essential competency. Data and analytics service providers can help leaders...
The only constant for financial services institutions is change. Regulations are constantly shifting, along with customer expectations, competition, security threats, geopolitical trends or just, technology.
Financial services organizations need to reimagine existing data analytics strategies to capitalize on the...
Companies that have harnessed their data are thriving, and many of the others have fallen behind. Or fallen. Leaders understand; their organizations are spending billions of dollars and countless hours to try to better tap their data. They're wrangling, integrating and managing massive volumes of data across countless...
ISMG and Cybereason visited Dallas on their "Indicators of Behavior" roundtable dinner tour. And Cybereason CSO Sam Curry says the discussion validated the notion that it's time to reimagine incident detection and response.
Big data analytics can help security professionals stay ahead of emerging challenges in a rapidly changing threat landscape, says Splunk's Haiyan Song.
Facebook has fixed a security vulnerability in its digital marketplace that could have been abused to identify the precise location of a seller, and by extension, their goods. Police warn that thieves regularly trawl location data to find the owners and locations of high-value items.
Security ratings and the analytics they provide give businesses a unique insight into their security performance and posture in relation to their peer group.
SIEM (security information and event management) software offers a lot of promise, but legacy SIEMs simply can't keep up with the rate and sophistication of today's cyberattacks. Organizations today require access to analytics-driven SIEMs that combine a big data platform that is optimized for machine data with...
More than ever before, companies are investing heavily in their organization's security. But as the threat landscape changes, how do you know that these investments in security are paying off - and how can you determine that you are investing the appropriate amount of security spending in the areas that matter most to...
Analytics, artificial intelligence and machine learning are increasingly playing promising roles in healthcare data security, say Ron Mehring, CISO at Texas Health Resources, a large delivery system, and Axel Wirth of Symantec, a technology vendor. They were featured speakers at the HIMSS19 conference.
Germany's competition authority, the Bundeskartellamt, has prohibited Facebook from combining user data from different sources unless users consent, and it has also prohibited Facebook from blocking users who do not provide this consent. Facebook has one month to appeal the antitrust decision.
Improved integration, automation and orchestration are needed to better detect and respond to evolving cyberthreats, says John Maynard, vice president and global security specialist at Cisco Systems.
User behavioral analytics can help better detect indicators of potential threats, both external and internal, says Carl Leonard, principal security analyst at Forcepoint.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.