At CA Technologies, mobile security is not just a solution for customers; it's a practice that IT security leaders have embraced internally. CA's Robert Primm discusses how to secure a borderless workplace.
For every Sony, Target, or Anthem, dozens of other organizations have had data stolen or corrupted by hackers - or even their own users. Cyberthreats become more sophisticated every year, raising the importance of proper security controls.
Simple passwords, lax system auditing, and overly privileged users leave...
Phishing and malware threats are growing and becoming more commonplace as cybercriminals become more adept, stealthier, and more able to penetrate corporate security defenses. Despite the billions of dollars spent each year on anti-phishing, anti-malware, anti-spam and other security solutions, threats still find...
Many security pros look askance at "cybersecurity." But Symantec's Sian John says the embrace of that term shows just how much senior executives are beginning to understand the risks their organizations face.
Assessing the risks presented by "digital business" - the new business designs that blur the digital and physical worlds - will be a theme at the 2015 Gartner Security and Risk Management Summit, says Andrew Walls, event chairman.
During a time of significant change for corporations, when today's modern network extends far beyond the company's physical walls, it's disturbing that companies face such well-organized and pervasive threats.
The last iterations of Apple business dominating OS of choice gave IT new options in security and new concerns in how to manage information sharing.
Download this checklist to assess:
Business process readiness;
Technical readiness;
User readiness.
The threat landscape has changed dramatically, and so must organizations' approach to cybersecurity. Jim Anderson of BAE Systems Applied Intelligence discusses lays out the elements of the new cybersecurity agenda.
In an interview recorded at RSA Conference 2015, Anderson discusses:
What's wrong with our current...
As a business leader who faces the challenges of protecting the enterprise in today's complex and dangerous threat environment. You need a security policy that is cyber resilient. Download this white paper to learn more about a security strategy that increases visibility into cyber attacks, anticipates and mitigates...
A look at recent history illustrates the oscillating nature of technology. In the 1980s, IBM mainframes dominated the landscape. In the '90s, client-server computing came on the scene and data was distributed on personal computers. Now, as mobile devices continue to populate the enterprise at a rapid rate, the IT...
If there is one thing that can be said about the threat landscape, and cybersecurity as a whole, it is that the only constant is change. Get the latest on the threat landscape with this up-to-date overview, analysis, and key findings report. The 2015 Internet Security Threat Report (ISTR) provides an overview and...
When it comes to mobility, enterprises are not nearly as secure as their security leaders believe them to be.
Read this global survey of nearly 400 information security executives to learn why organizations are currently ill-prepared to:
Defend their critical data
Deploy security controls to evolve with...
Island hopping techniques used by cybercriminals are becoming much more sophisticated. There has been a serious paradigm shift of cybercriminals to colonise our ecosystems. How are hackers targeting trusted third parties to bypass the perimeter defenses of the intended targets? Attendees will gain knowledge of the...
Mobile banking is growing out of its infancy and experts predict it will soon be the dominant banking and payments channel. However, with mobile operating systems and their varying support of security best practices, multiple new threat vectors are being introduced and many are already being widely utilized for...
The lead cybersecurity official for Britain's GCHQ intelligence agency dismisses charges that the U.K. conducts mass surveillance. But critics question the government's introduction of the Investigatory Powers Bill.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.