No script, no filter: Just Microsoft’s Edna Conway and Cisco’s Wendy Nather gathering with privacy leader Michelle Dennedy to discuss the impact of the SolarWinds supply chain attack and to play Buzzword Mystery Date with SASE, CIAM and "passwordless" authentication - are these trends dreamboats or duds?
The latest edition of the ISMG Security Report features an analysis of whether the FBI removing malicious web shells from hundreds of compromised Microsoft Exchange Servers could set a precedent. Also featured is a description of an unusual fraud scam plus an update on security product development trends.
Almost 50% of phishing attacks targeting financial services intend on stealing corporate login credentials.
Cloud reliance has increased mobile vulnerability, as attackers use increasingly complex cyberattacks that go beyond the management capabilities of an MDM. Once attackers have access, they move laterally...
The story of 2020 is of the devastating COVID-19 pandemic, and of how the world adapted. The story of malware in 2020 then is a story
of how the tools and tactics of cybercrime and cybersecurity changed against a backdrop of enormous changes to ordinary life.
Download this whitepaper to learn more about:
...
MSPs are continuously challenged to protect their customers against the rugged terrain of today’s threat
landscape. With the constant need to eliminate more infections, block new threats, and maintain a high
level of customer productivity and confidence, more and more MSPs are turning to the Malwarebytes
MSP...
Managed Service Providers (MSPs) are an important part of the IT environment, providing the knowledge and the trusted partnerships
that enable organizations of all sizes to embrace innovations made available by our era of digital transformation.
While there has never been a more exciting time to be an MSP, there...
Having exponentially more devices on the network leads to proportionately less visibility. This is reality for most enterprises today, and it’s changed the role of endpoint security solutions. Elias Levy of Cisco discusses emerging technologies and strategies, including the rise of XDR.
In this eBook, Levy...
Hospital CISOs need to make board members more aware of why cybersecurity should be an essential element of enterprise IT governance - especially as the use of internet-connected medical devices continues to grow, says Alain de Maght, CISO of a group of public hospitals in Brussels, Belgium.
Dave DeWalt, former CEO of FireEye and McAfee, has been appointed vice chair of the board of LogDNA, a log management company, and he’s committed to the popular “shift left” movement. But he’s also got a keen eye on the broader cybersecurity marketplace and shares insights on its seismic changes.
Four editors at Information Security Media Group discuss important cybersecurity issues, including President Biden’s latest cybersecurity proposals and large vendor-related breaches in healthcare.
More precise and pervasive cybersecurity threat modeling during manufacturers' development of medical devices - and also during the regulatory product review process - is critical for risk mitigation, says Kevin Fu, new acting director of medical device cybersecurity at the FDA.
One of the biggest trends in 2020 was the rise of complex, multi-staged cyberattacks. These attacks used new delivery mechanisms - like macros and other legitimate app functionality - to evade detection by antivirus software, hide data exfiltration actions (e.g., steganography), and coordinate multi-staged maneuvers...
With people and data moving everywhere, security has to be agile to keep up. Now, the key issue facing many organizations is how to most effectively provide safe access to corporate resources on the web, in cloud apps and in internal, private apps anywhere, while keeping data safe everywhere.
SASE has rapidly...
Driving Office 365 adoption is an important goal 87% of IT professionals say it's a top priority. Yet few have fully migrated their users and apps due to concerns around security, compliance, and poor user experience caused by network architecture limitations and constraints.
Forcepoint's Office 365 solution can...
Unrivaled visibility into early activity on
users’ computers prevents data theft
and loss by hijacked systems, rogue
insiders, or negligent end users.
Forcepoint Insider Threat has been identifying
and stopping threats from within for
government and Fortune 100 customers for
more than 15 years. With more than...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.