If you want to anticipate a prospective hacker's moves, then you'd better be able to think like one. That's the position of Terry Cutler, an ethical hacker who dedicates his time to testing organization's cybersecurity defenses - and their people.
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features New York Presbyterian's Jennings Aske on getting serious about medical device security. Another influencer, John Gunn of VASCO discusses the ISMG Faces of Fraud 2017: Survey Analysis and...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Gartner's Avivah Litan on Attribution & Elections. Other influencers like David Pollino Bank of the West CSO, Art Coviello, former CEO, RSA Security, and Kenrick Bagnall, Detective...
The RSA Conference returns to Abu Dhabi in November, and event organizers Linda Gray Martin and Britta Glade say this year's agenda is packed with new speakers and topics unique to this growing annual event.
This monthly Security Agenda will highlight some of the most recent additions to our course library. September's edition features Ed Amoroso on the evolution of the role of a CISO. Other influencers like Hearst CISO David Hahn, First U.S. CISO, Gen. Gregory Touhill, Retired and Jennings Aske, CISO of New...
One thing we know for certain - cyberthreats and cyber-risks are growing, perhaps exponentially. So how can small and medium-sized healthcare institutions and practices, which lack the resources of Fortune 100 companies but have extremely valuable data, address these risks? The answer lies in finding solutions that...
Too many organizations continue to address breach response from a reactive mode - having a crude disaster-recovery plan in place in case something "does" happen, rather than accepting that something "will" happen and proactively preparing for it. In this session, a panel of legal, technical and law-enforcement experts...
Data breach truism: So many organizations get breached, and remain breached, but don't find out until months or even years later, says Paul White of the cybersecurity firm Cyber adAPT. He offers insights on speeding reaction time by watching for clues.
Mitigation efforts only go so far when it comes to breach prevention. Why are some organizations still resistant to cyber insurance? Tim Francis of Travelers Business Insurance explains.
Demands by politicians that people must be willing to surrender their privacy rights to help security services battle cybercrime are shorthand for governments having significantly underinvested in the required resources, says information security expert Brian Honan.
As the global threat landscape shifts, so does Kaspersky Lab. Moving from its traditional cybersecurity focus, Kaspersky now is honing in on fraud prevention. Emma Mohan-Satta describes this shift and what it means for security and anti-fraud leaders.
"Fake news" isn't just a political concept. It's also a component of the marketing hype about Europe's General Data Protection Regulation, says Jonathan Armstrong of the law firm Cordery. How can security leaders cut through the hype and focus on what's truly important to their business?
Artificial intelligence and machine learning are the current darlings of security solutions marketers. But Giovanni Vigna of Lastline wants security leaders to know what machine learning in particular can - and cannot - do to improve cybersecurity defenses.
Not so long ago, the information network was a tangible entity to manage and secure. Today, in the age of the cloud and connected devices, network security is a whole new creature. Michael DeCesare, CEO of Forescout, discusses how to respond to this evolution.
As the WannaCry outbreak demonstrated, many organizations run outdated operating systems. Too often when systems - and especially embedded devices - still function, there isn't a convincing business case for upgrading. ESET's Mark James asks: Whose fault is that?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.