It's one thing to talk or even plan about "What happens if we are breached?" It's quite another to undertake a true breach exercise. What are the critical elements of such a drill? Author Regina Phelps shares advice from her new book.
Ninety-nine percent of the enterprise workforce currently uses mobile devices smart phones and tablets to perform their jobs today. And nearly 60 percent of security leaders describe their organizations as either partially or fully mobile, deriving enhanced productivity and other business benefits. These are among...
The Defense Advanced Research Projects Agency has awarded Georgia Tech a $2.9 million grant to develop a process for quickly identifying and then defending against low-volume DDoS attacks, which are far more common than high-volume attacks but can be just as disruptive.
Healthcare IT organizations are rapidly adopting cloud infrastructure as a wise alternative to managing their own data centers. However, not all cloud service providers (CSP) are created equal. Safeguarding PHI in the cloud requires advanced multilayered security measures.
Download this white paper...
The stark reality all healthcare industry executives must face is that their organization will likely experience a data breach. The only questions are: When will it happen, how pervasive will it be, and how much will it cost them to remediate the problem?
Download this whitepaper to:
Review and analysis of...
Even as cloud computing is increasingly adopted by healthcare organizations to host new workloads and applications, misconceptions still persist about the resilience and assuredness of cloud security. As clinical and IT stakeholders consider moving functions to the cloud, they may continue to have nagging doubts about...
Achieving HIPAA compliance is a journey, not a destination. The regulatory landscape is constantly changing, resources are stretched beyond capacity, disparate systems make it difficult to assess and remediate gaps, and the sophistication of cybercriminals is accelerating faster than most healthcare organizations can...
Accurate authentication continues to be a key imperative for global digital businesses. However, as cybercrime tactics become more widespread and pernicious, how can organizations really understand the full spectrum of attacks?
The FTC and FCC have launched security investigations of mobile device makers and wireless carriers, citing growing concerns over vulnerabilities that threaten "the security and integrity" of these products and services. The regulators are examining how security patches are distributed.
With today's multi-layered attack surface, traditional vulnerability management no longer suffices. Security leaders must embrace a new strategy to help identify and secure true assets at risk. Gautam Aggarwal of Bay Dynamics explains how.
The emerging threats posed by cybercrime and evolving banking services, including mobile banking, will be among the focal points of a keynote address by the Information Security Forum's Steve Durbin at ISMG's Fraud & Breach Prevention Summit in Washington May 17-18.
The influence of President Obama's cybersecurity legacy on the next administration is among the topics to be discussed at ISMG's Fraud and Data Breach Summit in Washington May 17-18. Featured speakers include NIST's Ron Ross, DHS's Phyllis Schneck and Virginia Technology Secretary Karen Jackson.
Anonymous has unleashed a DDoS campaign against banks, commencing with an attack against the Bank of Greece's website, followed by attacks against other bank websites. But the impact of the interruptions apparently has been minimal, continuing Anonymous' track record for attacks that fail to pack much of a punch.
Financial crime control is a chief priority for most financial institutions around the world, as they continuously evaluate the best ways to safeguard their systems, their data and, ultimately, their clients. Indeed, fraud and cyber security are on the formal management committee agendas at least quarterly for 80...
Financial crime control is a chief priority for most financial institutions around the world, as they continuously evaluate the best ways to safeguard their systems, their data and, ultimately, their clients. Indeed, fraud and cyber security are on the formal management committee agendas at least quarterly for 80...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.