In the 20 years since the Sept. 11, 2001, al Qaida terrorist attacks on targets in the U.S., the need to shore up critical infrastructure and build resilience into systems remains a priority. But over the past two decades, concerns about physical threats have been displaced by cyber concerns.
Joey Johnson, CISO of Premise Health, a Brentwood, Tennessee-based provider of online healthcare services, outlines a three-pillar security program in which "identity is the central aspect."
Many employees are likely to begin looking for the flexibility and ease that remote work offers even as the pandemic wanes, turning many previously in-person government workplaces into hybrid ones.
As agencies begin to support a more permanent remote future, it’s critical that they build security in every step of...
How to Classify and Protect Cloud Data at Scale
Due largely to data sprawl across the cloud, misconfigurations of security controls are found in a majority of security incidents, like ransomware attacks. For this reason and others, data classification and the parent concept of governance is a growing need for...
Everywhere you look, “passwordless” is the hot topic in cybersecurity and every enterprise’s ultimate security goal.
…but what does it really mean? You might hear a lot about the journey to passwordless, but this guide will dive into why it is so important and how to get there in the most simple way.
As identity related attacks have increased in recent years, organizations are continuously evaluating how to optimize the security policies in their environment.
In this whitepaper, we cover Okta ThreatInsight, a baseline security feature of the Okta Identity Cloud which helps organizations secure their organization...
Phone-Centric Identity, also known as mobile identity, device intelligence, or phone intelligence, refers to technology that leverages and analyzes mobile, telecom, and other signals for the purposes of identity verification, identity authentication, and fraud prevention.
Download this whitepaper to learn more...
The past year has been a milestone one for RSA and for RSA Conference alike. In this exclusive interview, RSA Group CEO Rohit Ghai discusses the changes, the state of secure identity and the role XDR will play in shaping cybersecurity's future.
The federal ban on funding for a national unique patient identifier adds to the complexity of customer identity and access management, especially when dealing with new patients during the COVID-19 pandemic, says Aaron Miri, CIO at UT Health Austin.
More use cases are emerging for self-sovereign identity, which gives individuals more control over their digital identities, according to Heather Dahl and Ken Ebert of Indicio.tech.
Remote work isn’t a trend, but a new way for businesses to operate. There’s no longer a defined parameter to operate. Instead, IT teams are coping with multiple devices, networks, locations and ways of enabling employees to access professional applications. Cybercriminals are capitalising on this opportunity.
In...
Loving your pet and creating tough-to-crack passwords should remain two distinctly separate activities. Unfortunately, Britain's National Cyber Security Center reports that more than 1 in 6 Brits admit to using the name of a pet as their password. And the problem is global.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.