Earlier this month, I had the chance to attend RSA Conference 2012, which always reminds me how fluid our industry is, and how important it is to stay educated and abreast of change.
"If you talk to CSOs, they don't worry about what they know about; they worry about what they don't know about," says Jon Ramsey, CTO of Dell SecureWorks, discussing threat intelligence.
"People appreciate being contacted when particular transactions look risky," says Peter Tapling, President and CEO of Authentify. "Out-of-band authentication provides the opportunity to do that in real-time, at very low cost to the institutions."
Far too many identity solutions today rely on simple user names and passwords, says Brent Williams, CTO of Anakam Identity Services - the identity product line of Equifax. But the future of identity is bright, he says.
The rapid adoption of electronic health records at physicians' offices, which are making the transition from paper to digitized records in the blink of any eye, means ensuring the security of that information is a major challenge.
Imperva would neither confirm nor deny it helped defend the Vatican website from a hacktivist assault last year, but the IT security provider's director of security, Rob Rachwald, explains how such an attack was constructed and defended.
Most breaches have a link to an insider, but security leaders continually fail to recognize the signs. Why do organizations miss the obvious risks, and what can they do to improve their tactics?
Radiant Logic, SonicWALL and M86 were among the organizations to issue product/solution news releases at RSA Conference 2012. See the latest announcements from the show.
What are the top global breach trends and threats that organizations should be watching? Wade Baker of Verizon offers insights gleaned from a new study of his group's latest investigations.
In the PATCO Construction fraud case, attorney David Navetta says the court failed to address two key concerns: reasonable security and good faith. What's next in PATCO's ongoing legal battle?
FBI Director Robert Mueller says the bureau will apply the methods it uses to combat terrorism along with old-fashioned gumshoe practices such as infiltration of criminal networks to battle cybercriminals.
Voltage Security, TODO1 and IBM were among the organizations to issue product/solution news releases at RSA Conference 2012 this week. See the latest announcements from the show.
White House Cybersecurity Coordinator Howard Schmidt, in an exclusive interview, expresses optimism that Congress could enact significant cybersecurity legislation this year even if President Obama doesn't get all that he wants in an IT security bill.
"The changes we propose in revision 4 are directly linked to the current state of the threat space - the capabilities, intentions and targeting activities of adversaries - and analysis of attack data over time," says NIST's Ron Ross.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.