By nature of its name, the so-called "dark web" has acquired a unique reputation. Danny Rogers of Terbium Labs discusses some of the key myths and realities about the dark web, as well as how organizations should monitor it. Why is this so important?
The dark web has become a well-traveled marketplace for data...
Two NIST initiatives aim to close the cybersecurity skills gap. One is an interactive, online tool known as CyberSeek; the other is updated guidance known as the NICE Cybersecurity Workforce Framework. In this audio report, NICE Director Rodney Petersen explains the connection between the two.
Despite high-profile leaks and the attention given to the insider threat, many organizations still fail to even see that they have an insider threat problem. Ajit Sancheti, CEO of Preempt, discusses what's needed to improve insider threat detection.
It all starts with trust, Sancheti says. And sometimes, frankly, we...
What critical factors make the healthcare sector vulnerable to cyberattacks? In this audio interview, CISO Dave Summitt of the H. Lee Moffitt Cancer Center and Research Institute offers insights.
More than half of surveyed security leaders rate their organizations' current anti-malware protection above average or superior. And yet ...
54 percent say their organizations have experienced ransomware in the past year;
25 percent say they struggle with threat detection;
51 percent say their current anti-virus...
How Effective Are Your Current Anti-Malware Tools for Keeping Endpoints Secure?
More than half of surveyed security leaders rate their organizations' current anti-malware protection above average or superior. And yet ...
54 percent say their organizations have experienced ransomware in the past year;
25...
Virtually every industry is prone to cyberattacks, online fraud and identity theft. For years' banks have secured online transactions for commercial accounts and private banking customers via multifactor authentication. Now through organizations like the NCSA and HIMSS, multifactor authentication may finally become...
With comprehensive network modeling extending into virtual networks, network security engineers can gain the needed visibility to unify security and compliance processes across their hybrid hardware and virtual environments.
Although an analysis of the latest government statistics confirms continued growth in the information security workforce, the supply of security expertise isn't meeting the demand.
Understanding the difference between cybersecurity crisis management and security incident response could be critical to your organization's survival. In this blog, a CISO offers insights on creating an effective crisis management plan.
Healthcare organizations must adopt a "wartime" mindset against their sophisticated, persistent attackers. But how can CISOs lead the way in developing an effective security action plan designed for the current threat environment?
In this session, experienced healthcare CISOs will:
Provide real-world insights on...
Ransomware has become one of the biggest cyber security threats in the world, with instances of ransomware in exploit kits increasing about 44% in the last six months. According to FBI statistics, hackers extorted business and institutions for more than $209 million in ransomware payments in the first three months of...
IT security industry has developed new methods and technologies to help reduce the threat of a major breach while reducing the cost of day-today upkeep. The common way of protecting systems is to employ discrete tools such as software intrusion detection and firewalls. A more efficient and sophisticated approach,...
The Next-Generation Endpoint Security (NGES) market is most similar to the Endpoint Threat Detection and Response (EDR) market identified by Gartner, but also overlaps the Specialized Threat Analysis and Protection (STAP) market identified by IDC. The NGES market is highly competitive. With a 2013-2014 annual growth...
It's a story you'll watch unfold time and time again. The breach. The headlines. The confusion. The public apologies. The finger-pointing. And it's often followed by some form of the following statement: "But I was compliant." Compliance is never enough. The challenges are understandable, but taking the path of least...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.