Email is the most used communication tool in the business and the vulnerabilities of email should not be overlooked. Implementing the right email encryption solution can be an easy way to secure sensitive corporate data, avoid breach costs and meet regulatory obligations.
Download this eBook to discover:
The...
Hybrid cloud adoption is accelerating within the financial services industry and few organizations have a solid understanding of how to secure hybrid cloud.
Most companies employ an array of cloud services from an array of providers, each with its own set of security controls, frameworks and products that increase...
The regulator and legislative fallout of the global financial crisis continues to place intense pressure on the financial industry.
Not only is the volume of regulations growing, so is their complexity a result of the diverse and inconsistent array of regional and jurisdictional mandates being imposed on financial...
The struggle is real as DoD moves from DIACAP to RMF. System owners are challenged to adopt technology that can address the more dynamic controls required by RMF.
Learn how to get help from defense agencies to monitor and assess their systems for RMF compliance by automating the gathering, analysis and reporting of...
In 2014, the Department of Defense (DoD) issued instructions that replaced DoD Information Assurance Certification and Accreditation Process (DIACAP) with the Risk Management Framework (RMF). The RMF is designed to be managed as a continual process as the risk posture evolves over time for each information...
The fact that Federal agencies are prime targets for the most sophisticated cyber threats is undeniable. If cyberattacks are inevitable, then robust capabilities for security investigation, threat hunting, and rapid response are essential. Government cybersecurity professionals require visibility across their silos of...
Does your organization know where it is most vulnerable? This guide explores what the leading threats to Critical National Infrastructure (CNI) are and how you can prevent them from shutting down the grid.
Download this whitepaper to learn:
What sectors are considered most vulnerable to a cyber-attack and...
A class action lawsuit filed against Allscripts in the wake of a ransomware attack that recently disrupted patient care at hundreds of healthcare practices will spotlight a variety of critical security and legal issues, says Steven Teppler, the plaintiffs' attorney, in this in-depth interview.
Micro-segmentation is fast becoming a foundational layer of the security architecture for today's data center and cloud computing environments. It has seen a big push by a range of vendors as well as growing recommendations from leading analyst firms such as Gartner, ESG, and the 451 Group.
The idea of using network...
As of January 1, 2018, all SWIFT customers must self-attest to their compliance with the new SWIFT Customer Security Program (CSP). The program is designed to respond to the wave of cybercrime targeting SWIFT installations that began with the Bank of Bangladesh breach back in February 2016 and has swept across the...
In the wake of a ransomware attack that disrupted patient care services for hundreds of Allscripts' customers, a class action lawsuit has been filed against the cloud-based electronic health records vendor for allegedly "failing to secure its systems and data from cyberattacks."
People are always the weakest link in security, but the stakes are higher now because of the massive amounts of sensitive information accessible online and the determination of cyberattackers. The standard username/password approach is no longer enough.
Because of this, government agencies are starting to realize...
Given the robust IT infrastructure of most financial institutions, it's easy to conclude that on-site deployment of a governance, risk and compliance (GRC) solution is the way to go. But there are compelling reasons to go with an integrated, cloud-based solution. Efficiency, flexibility and security are just three of...
As the cybersecurity threat landscape evolved over the past two decades, firewalls grew increasingly ineffective at blocking attackers from accessing network data. Next-generation firewalls (NGFWs) aim to fill those gaps, but do they really provide an all-encompassing solution for network security?
Download this...
The conversation around the cloud is not something new to the industry, with the topic showing up everywhere from IT back offices to Fortune 500 C-Suites. Despite cloud's ubiquity, there is still a lot to understand, regardless of your expertise level; there is not just one single cloud - and, for that matter, not all...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.