Launching a successful data analytics project requires asking three critical questions, says Maryam Hussain, partner, forensic and integrity services at Ernst & Young in the U.K.
Tool sprawl is a symptom, and complexity is cybersecurity’s chronic illness. Ashok Sankar of ReliaQuest shares ways to manage this complexity and help organizations rethink how they deploy and measure their cybersecurity defenses.
For a long time now, financial industries have been known for embracing innovation to meet the ever changing consumer needs. As we move through accelerating digitization, data remains at the crux for personalized content, offers, and product recommendations. On top of this, a good digital experience which is...
Pharmaceutical companies can leverage data analytics, predictive analytics and artificial intelligence to fight drug diversion fraud, says Charles Washington, senior director, global fraud and asset protection, at Pfizer.
With the explosion of remote business, we are
now digitizing many of our documents and
processes. Jay Schiavo of Entrust explains what
new mindset this shift requires and shares advice for
organizations currently making the shift.
Download this eBook to learn more about:
What’s needed to ensure document...
This paper will lay out key steps to help organisations sensibly adopt a better data protection posture and with it, build a firm foundation towards onward compliance. The key principles of Classification by Design will be introduced as a logical, yet robust start point. We summarize with the overarching takeaway that...
A centralized log strategy has become an essential component in the administration of today’s complex IT environments.
Since log management data is central to the analysis of securing IT enterprise services, understanding operational
performance of IT infrastructure and applications, and key to meeting data...
Organizations must adopt a new approach to security automation that's tailor-made to address today's threats, says Joseph Blankenship, vice president and research director at Forrester.
It is essential that government organizations and the private sector bodies in their supply chain have the
right solutions in place to minimize the risk of data loss in the public sector. Systems for data classification
and data loss prevention allow organizations to effectively control and manage data and ensure...
Global Data Visionaries are making waves in the digital world. They are championing privacy-led approaches to data usage, which enable organizations to realize the full value of their data, bespoke to their contextual needs.
These ‘Data Visionaries’ comprise of individuals who have disrupted industries or...
The Department of Veterans Affairs’ watchdog agency alleges that two VA employees “concealed” and “mispresented” the cybersecurity and privacy risks of an ambitious "big data" project that would have analyzed 22 million veterans’ health records dating back two decades.
Adam Turteltaub, chief engagement and strategy officer at the Society of Corporate Compliance and Ethics, says compliance teams should create a dashboard of data that will help keep track of actions taken by staff members who are working remotely.
An evolving workplace, greater reliance on IoT and the cloud, and already we have seen the new face of supply chain attacks. This is the backdrop for 2021, and Imperva's Brian Anderson offers insights into the cyber-attack outlook.
Every month, threat analysts put together a report on the top observed threats detected by the collective defense community. Read this report to learn about threat findings, analysis, and research shared across IronDome, the industry's first Collective Defense platform for sharing network behavior analytics and...
A quarter of a century of digital transformation, accelerated by the COVID-19 pandemic, has led us into the data age. However, a new global survey finds that most organizations are not ready for these new waves of data emerging from new digital technologies.
Taking a closer look at organizations in France. Most are...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.