Despite the presence of advanced antivirus solutions, cyber criminals continue to launch successful attacks using increasingly sophisticated malware.
Download this white paper to learn:
Why antivirus software is no longer effective in detecting, let alone stopping, most malware
Why a layered approach to...
For virtualization security, there's no one size fits all solution...and trying to fit your organization's specific needs into the wrong security product can be a costly mistake. Do you know how to pick the right option for your organization?
Download this white paper to explore:
Different virtualization...
Choosing the right MSSP partner is an important decision in an organization's overall security. Writing an RFP is the first step in the process to finding the right fit for the organization. By using this document, an organization should be able to choose an MSSP and write a tailored RFP/RFI that will help make the...
The PCI DSS was developed to "encourage and enhance cardholder data security and facilitate the broad adoption of consistent data security measures globally. PCI DSS provides a baseline of technical and operational requirements designed to protect cardholder data." Even by following the PCI DSS guidelines, it is...
Every company, regardless of size, has confidential information that needs to be protected. With data breach incidents happening on an almost weekly basis, organizations must take the necessary precautions to ensure their data is secure. But how many organizations are truly making efforts to keep their data...
For a long time, cloud file sharing services such as Box and DropBox were the dirty little secret that IT pros did not want to talk about. Their convenience won over droves of office employees, who adopted the services to share files with coworkers, consultants and contractors - even with themselves: Cloud file sync...
Enterprise file sync and share (EFSS) adoption is now fairly universal, and IT pros have generally accepted its use as a part of enterprise computing today. With this increasing rate of adoption, the newest wave of concern for the large number of companies using EFSS solutions begs the question - how do we make sure...
Matching all the right records from multiple sources to the right patient has long been a challenge because of the lack of a widely used patient identifier. That's why the College of Healthcare Information Management Executives has launched a $1 million competition to help pinpoint a practical solution.
Cyber insurance covers more than the cost of breaches of data privacy; it can play a role in protecting against the cost of a cyberattack that disrupts business operations, explains insurance specialist Tim Burke in this video interview.
Today's enterprise infrastructure is full of
blind spots that can hide malicious threats,
and traditional security tools struggle to scale
up to meet increased demands. How must
security leaders respond? Amrit Williams, CTO of
CloudPassage shares insight.
Download this interview on meeting the security needs...
In 2015, there were nine common web application attack vectors. They
represent a cross section of many of the most common categories seen in industry
vulnerability lists. The goal of this report is not to validate any one of the vulnerability
lists, but instead to look at some of the characteristics of these...
DataBreachToday announces its inaugural list of top influencers, reflecting the individuals and organizations who have the biggest impact - good or bad - on the data breach landscape and growing breach epidemic.
Proposed HIPAA Privacy Rule changes in pending federal legislation could lead to elimination of the requirement to de-identify patient data that's used for research purposes, raising questions about whether that data will be at a higher risk for breaches, warns data de-identification expert Khaled El Emam.
Thought leaders within the IT community are beginning to view cybersecurity not just as part and parcel of the everyday cost of doing business, but as a direct driver of business continuity and bottom-line growth. This shift in perception has begun to have a dramatic impact on the position and role of security...
Are you using dated IT operations metrics to communicate to your board about the effectiveness of your cybersecurity program? How do you successfully demonstrate the value of your current cybersecurity investments - and a useful ROI for more to your leadership team?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.