Only 23 percent of surveyed organizations can respond effectively to a cybersecurity incident. This is among the findings of Solutionary's fourth annual Global Threat Intelligence Report. "When malware authors are out there creating malware to do its mission, the first mission of the malware is to do what? It's to...
Five new payment card data security requirements for third-party service providers are among the most significant changes included in version 3.2 of the PCI Data Security Standard released April 28, says Troy Leach of the PCI Security Standards Council.
Despite the arrest and conviction of scores of cyber criminals - including members of the Blackhole exploit kit, SpyEye and GameOver Zeus crews - malware and ransomware threats continue to grow.
The House of Representatives has unanimously approved the Email Privacy Act, which would require law enforcement to obtain a warrant before compelling third-party service providers to surrender their customers' email and text content. The measure now goes to the Senate, where it has bipartisan support.
A new U.S. Government Accountability Office report outlines weaknesses in vehicles' electronic systems that could be exploited to endanger occupants and offers ways to mitigate the risks.
Denise Hayman, vice president at the security firm Neustar, offers in-depth advice to women interested in launching an information security career in this audio interview.
The most important lesson from the lawsuit electronic health records vendor Epic Systems filed against Tata Consultancy Services is that data security controls must extend beyond protecting personally identifiable information to include intellectual property, attorney Ron Raether explains in this audio report.
Encryption solutions are a key component of data protection and are part of Intel Security protection suites. These capabilities include drive encryption, file and removable media protection, and management of native encryption.
Download this white paper to explore
The various endpoint encryption solutions...
Microsoft Office 365 is being rapidly adopted by organizations of all sizes to give users greater flexibility and access to applications anytime, anywhere, and on virtually any device. Despite built-in data protection, additional capabilities are needed to protect precious data from advanced threats and malicious...
This in-depth report provides a detailed look at a recent survey exploring the topic of data exfiltration. Participants were asked about their top concerns, breach and exfiltration details, outsider and insider threats, exfiltration differences between traditional networks and cloud applications, and the tools and...
With the rapid increase of PCs, tablets, and other devices in the enterprise environment, it's critical to ensure that sensitive data is secure, and one of the best ways to achieve that end is encryption. Intel Security data protection solutions offer a variety of encryption capabilities and solutions to cover both...
Mobile data protection solutions defend access to secure data on storage systems in notebooks, removable media, desktops, servers and cloud storage environments. Buyers seek data protection policy enforcement across multiple platforms, minimal support costs and proof of protection.
Download this white paper to...
Enterprise DLP continues evolving to support both content-aware and context-aware capabilities, as well as support for IT security leaders to cover broader deployment use cases beyond regulatory compliance and intellectual property protection.
Download this white paper to explore
Various vendor strengths and...
In an alert to banks, SWIFT warns that it's seen repeat attempts by hackers to subvert its messaging system, which banks around the world use to move money. It's released a "mandatory" software update to help customers identify signs of attack.
A HIPAA-related legal dispute between a Chicago-area health information exchange and its key IT vendor, which is going out of business, spotlights several important privacy and security issues.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.