Organizations deploying deception technology must make sure to integrate it with other technologies to reap the full benefits of intrusion alerts, says Anuj Tewari, global CISO at IT Services HCL Technologies.
Digital transformation may have occurred over a weekend in March, but the effects will be felt - and secured - for years to come. How will global enterprises in 2021 validate identities, defend networks without perimeters and secure a permanent remote workforce? A panel of CEOs and CISOs shares strategies.
Emerging passwordless security standards, elevated consumer and consumer-like experience expectations, and ballooning costs have moved eliminating passwords from a theoretical concept to a real possibility. In this whitepaper, we will explore the case for going passwordless for both customer and employee...
Organisations want their dev teams to roll out great new experiences that attract and retain customers while improving their lifetime value. However, today's end users are trained by the Googles, Amazons, and Facebooks of the world to disengage from experiences that aren't technologically advanced, frictionless,...
Consumers hate passwords, criminals love them. Most organizations today have an initiative to replace passwords with a modern approach that is both more convenient, and more secure. Completely eliminating password authentication across any channel and any device is a journey that takes time. Like major global...
Jeremy Grant, who led the public/private National Strategy for Trusted Identities in Cyberspace during the Obama administration, has spent more than two decades championing the cause of secure identity systems. Enter the COVID-19 pandemic, which created a remote workforce of unprecedented scale seemingly overnight....
This rising threat trend of remote work, along with the rapid growth of sophistication in malware, ransomware, DDoS and social engineering attacks has created a conundrum. How do we protect ourselves in an increasingly connected world? Nothing is completely unhackable, but there are a myriad of emerging technologies...
Why do so many enterprises remain chained to outdated and vulnerable identity and access management technologies - legacy systems that rely on passwords, eat budgets and kill productivity? Baber Amin of Ping Identity and Ramnath Krishnamurthi of LikeMinds Consulting preview a new virtual roundtable on Modernizing IAM.
Two recently reported health data breaches illustrate persistent security challenges - defending against ransomware attacks as well as unauthorized access to email - that sometimes can expose years' worth of data.
According to Unisys, we are witnessing in real time the long anticipated end of the VPN and firewalls. In a virtual roundtable preview, Jack Koons of Unisys explains the shift to data over infrastructure for cybersecurity.
As cyber and physical security continues to converge, a traditional siloed approach to workplace access can't keep up with the complex needs of today's banks and financial institutions.
Add in the additional complexities of the global pandemic, remaining competitive in the current climate has never been more...
The Gamaredon hacking group is now using a new set of malicious tools to compromise Microsoft Outlook as a way of sending spear-phishing emails to victims' contact lists, according to security firm ESET. This hacking group, which appears to have ties to Russia, has primarily targeted Ukraine for years.
As businesses reopen, they need to carefully consider the privacy, security and legal implications of collecting COVID-19 related information from customers, employees and other individuals, says privacy attorney Iliana Peters of the law firm Polsinelli.
Cloud computing offers organisations the ability to develop new technologies in less time, with a lower barrier to entry. As security leaders in government and regulated non-government enterprises migrate to public, private or hybrid cloud, they require strong security to prevent data breaches, protect sensitive...
Remote work is the new normal. In this new work-from-anywhere environment, how can IT leaders ensure always-on security while employees always have access to the business resources they need? IT needs to increase security to mitigate the risks associated with remote work, but to do so in a way that does not slow...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.