As mobility and the global network infrastructure
expands, the need for security assessment
and policy compliance is essential.
Download this interview with Wolfgang Kandek of Qualys for insight on:
The top challenges for IT decision makers with current vulnerability management (VM) and compliance
What is...
Connecting with the global Internet exposes your
company network to many threats. Savvy criminals can use
the Internet to break into your network, sneak malware onto
your computers, extract proprietary information and abuse
your IT resources.
You can prevent most of these attacks by using a...
A government watchdog warned four federal agencies that they must be more diligent in implementing their cybersecurity programs. Otherwise, some of the government's most sensitive information is at risk of being disclosed to unauthorized individuals.
Even if Radiology Regional Center succeeds in its effort to get a lawsuit related to its paper records breach dismissed, the case serves as a reminder of the critical need for healthcare organizations to safeguard documents as they migrate to digital patient record systems.
There is no such thing as "security by obscurity." Attackers can hack what they can't see. This means organizations must reimagine the fundamentals of API creation, says Jaime Ryan of CA Technologies.
In recent months, Cloud Access Security Broker solutions have emerged as a defacto, mandatory control. Which is better approach to CASB - proxy or API? Rohit Gupta of Palerra shares his insight and recommendations.
Boards need more information about cybersecurity than ever before. Do you know how to present it effectively?
Cybersecurity briefings used to be considered inconsequential; a box to check off the list. But today, boards have to consider the regulatory, fiduciary, organizational, and personal liability that could...
Does your organization have sensitive data stored across the globe?
Learn how understanding the global cyber threat landscape can help evaluate the potential risks of doing business in certain nations in this report.
How do some of the most prominent nations on the international stage differ in cybersecurity...
Outsourcing is nothing new. Industries have been embracing service providers for functions they either couldn't or didn't want to perform for years. This necessitated integrating business systems and providing these third party vendors with access to corporate networks and computer systems. The risk was generally...
The information security community's ability to respond to threats and vulnerability discovery improves with each passing month. However, attackers are also keeping up, or even exceeding the security world's defenses.One way to balance this problem is to not only focus on identifying the threat, but also to find an...
An experimental investment fund based on the digital currency ether has been hacked, with about $55 million worth of the currency stolen, according to news reports.
A mass password reset by Citrix-owned GoToMyPC shows how online service providers are still grappling with the fallout from recent large data breaches.
IT departments are overwhelmed by the abundance of vulnerabilities that continue to grow at a rapid pace every day. They struggle to identify the most critical threats they must address right away at any given point to protect their organizations from a compromise. Attempting to eradicate 100 percent of...
Hybrid IT is here. The flexible environment allows enterprise employees to use mobile devices to connect to cloud apps and on premise data centers in a seamless manner that boosts productivity and efficiency. Pulse Secure, in collaboration with cloud and security expert Jim Romeo, teamed up to co-author this piece...
The consumerization of IT and Bring Your Own Device (BYOD) has changed the whole working paradigm of the enterprises. The trend, which has been around for a while, is disrupting the way enterprises and employees access corporate networks and resources and is continuously evolving over time. BYOD is considered the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.