Have you tested things before they break? Could an email be a trap? In honor of Star Wars Day, we proudly present essential cybersecurity lessons as derived from - and delivered via - the wisdom and wit of the iconic space opera.
A bipartisan bill proposing to elevate the position of CISO within the Department of Health and Human Services seeks to emulate moves that some larger private sector organizations - mostly outside of healthcare - have made in recent years.
Healthcare entities are increasingly in the crosshairs of attackers who seek to cause business disruption. How can threat intelligence bolster cybersecurity defenses? FireEye's Dan McWhorter offers insight and strategies.
Following the theft of $81 million from Bangladesh Bank, is it time for banks to make SWIFT money transfers less automated and better supervised and thus secure? An alleged scam from the days of telex machines and code books offers useful perspective.
Defending the network against cybersecurity threats has become nearly impossible with traditional tools. The number of malware families continues to increase, the threats are more advanced, and the IT environment is more complex. What's more, due to a greater reliance on the network, a service outage, data breach or...
The Joint Commission, which accredits healthcare organizations, has reversed its long ban on physicians and other clinicians using text messaging to place orders related to patient care, citing technology advances that enable more secure communication. But users must comply with a list of requirements.
Ransomware has become one of the most widespread and damaging threats that internet
users face. Since the infamous CryptoLocker first appeared in 2013, we've seen a new era
of file-encrypting ransomware variants delivered through spam messages and Exploit Kits,
extorting money from home users and businesses alike....
Most enterprise IT professionals agree, securing the network only at the perimeter is inadequate for today's data centers. Modern attacks can exploit a perimeter-centric defense. In this paper, we show how VMware NSX enables security that is both ubiquitous and granular by integrating security functions into the...
This brief explains why it's time to take the next step toward the software-defined data center, and apply network virtualization and micro-segmentation to the network. It empowers infrastructure architects to react quickly to prevent breaches.
Build a fundamentally more agile, efficient and secure application...
This handy guide highlights some of the key benefits of securing your data center from within using micro-segmentation. Get started now.
Build a fundamentally more agile, efficient and secure application environment with VMware NSX network virtualization featuring Intel® Xeon® processors and Intel® Ethernet...
Discover how micro-segmentation, delivered through network virtualization, provides comprehensive data center security, accelerates delivery time, and enhances the agility of your data center. Download the eBook here.
Build a fundamentally more agile, efficient and secure application environment with VMware NSX...
The Verizon 2016 Data Breach Investigations report finds malware, ransomware and phishing attacks are more common than ever and creating even more damage. Organizations are continuing to get exploited via vulnerabilities that are months or even years old, forensics expert Laurance Dine explains in this interview.
A preview of director Oliver Stone's upcoming film "Snowden" portrays former NSA contractor Edward Snowden as a gung-ho action hero - a cunning insider and a clever operative.
Only 23 percent of surveyed organizations can respond effectively to a cybersecurity incident. This is among the findings of Solutionary's fourth annual Global Threat Intelligence Report. "When malware authors are out there creating malware to do its mission, the first mission of the malware is to do what? It's to...
Five new payment card data security requirements for third-party service providers are among the most significant changes included in version 3.2 of the PCI Data Security Standard released April 28, says Troy Leach of the PCI Security Standards Council.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.