In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including improving federal agencies' cybersecurity and businesses recovering from the pandemic's impact.
The latest edition of the ISMG Security Report features an analysis of how ransomware attackers share about their inclinations, motivations and tactics. Also featured: The rise of integrity attacks; dispelling vaccine myths.
Infection numbers are surging in the southern U.S., states and cities are enacting new mask mandates and the fall flu season looms as the great unknown. Sound familiar? COVID-19 is back with the highly contagious Delta variant. Pandemic expert Regina Phelps discusses what that means for business recovery.
These days, people, infrastructure and information are spread out more than ever. This means cloud attacks present a growing cybersecurity risk.
In this executive brief, Frost & Sullivan describes the impact of cloud migration on the enterprise and the top three urgent threats facing the digital workforce.
Get your...
Cloud video conferencing provider Zoom has agreed to settle a consolidated class action federal lawsuit for $85 million as well as reform its security and data privacy practices.
Security experts offer an analysis of Gartner's new strategic road map for SASE adoption that emphasizes the need for a detailed migration plan and offer tips for a successful rollout.
With corporate America beginning to ask employees to come back to their offices in the fall, cybersecurity teams have the huge task of ensuring that the work environment is safe. This is particularly true of IoT devices, as many have been left unprotected for months.
Global research uncovers IT security leaders’ key strategies for cloud complexity, remote work and supply chain attacks.
Security organizations have always been hard-pressed to keep up with the rising tide of data, the ever-expanding perimeter, and the increasing frequency and sophistication of attacks. Our...
Ransomware-wielding criminals continue to find innovative new ways to extort victims, develop technically and sidestep skills shortages by delivering ransomware as a service, said Robert Hannigan, the former head of U.K. intelligence agency GCHQ, in his Infosecurity Europe 2021 virtual keynote speech.
As organizations prepare a plan for migrating to the Secure Access Service Edge, or SASE, model, they need to carefully assess the need for reorganization of the networking and security departments, says Nat Smith, senior director, security analyst at Gartner, which coined the SASE term.
The Department of Health and Human Services needs to improve collaboration among several of its internal entities, as well as with external partners, in order to bolster cybersecurity threat intelligence sharing in the healthcare and public health sector, says a watchdog agency report.
The Covid-19 pandemic has vastly changed the world and the socioeconomic landscape, and quickly moved the world further online. Identity fraud rates and financial crime followed suit, posing additional challenges for businesses.
In this webinar Veriff co-founder and CPO (Chief Product Officer) Janer Gorohhov...
Advanced persistent threat actors will continue to "up their game," including taking advantage of the COVID-19 pandemic even as its impact diminishes, says Kelvin Coleman, executive director of the National Cyber Security Alliance.
There’s a need now more than ever for security organizations to implement a structured, detailed, and well-practiced incident response plan. As the Navy SEALs training philosophy goes, “slow is smooth and smooth is fast”—a mantra that can, and arguably should, be adopted by all security teams. In incident...
Criminals tricked into using an FBI-run encrypted messaging app, Verizon's 2021 Breach Investigations Report and overcoming the challenges of recruiting cybersecurity professionals are among the latest cybersecurity topics to be featured for analysis by a panel of Information Security Media Group editors.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.