When it comes to mobility, enterprises are not nearly as secure as their security leaders believe them to be.
Read this global survey of nearly 400 information security executives to learn why organizations are currently ill-prepared to:
Defend their critical data
Deploy security controls to evolve with...
A new report says the Department of Health and Human Services has several security weaknesses that may have contributed to five recent data breaches. But are other healthcare entities guilty of the same mistakes?
The conduit between user access and protected data is a known target. This is where the StratoKey countermeasure engine comes into play. The countermeasure engine is a rules based engine where administrators can set what essentially amount to firewall rules. These rules can be benign such as IP range specifications,...
In today's complex cyberthreat landscape, it's more important than ever to have the right security solution in place. Are you settling for partial protection?
Download this white paper, "Endpoint Security for Business: Technology in Action", to learn about:
Threats you can see and those you can't;
The...
You're at your desk, working to finish a project on a deadline when, all of a sudden, your screen freezes and a dialogue box pops up to tell you that your computer is locked and your files will all be destroyed if you don't pay up. Unfortunately, this is not the script for a crime drama. Since many victims are willing...
Cyberattacks can be the downfall of an organization's reputation. News headlines are filled with stories of major corporate data breaches across all industries.
To effectively navigate the increasingly sophisticated and complex threat landscape and keep your organization out of these kinds of news stories, you need...
Cybersecurity is not a numbers game. When it only takes a single breach to inflict serious damage on your business, defending against the majority of attacks isn't enough.
Kaspersky Lab recommends focusing on prevention and mitigation of advanced threats. Our Global Research and Analysis Team (GReAT) wants to help...
With the federal government clearly in the bullseye of hackers, the Department of Veterans Affairs is revamping its cybersecurity strategy under its new CIO, LaVerne Council, who took over the job last month.
Threat intelligence may be one of the most over-hyped capabilities within information security because depending on whom you ask you are always going to get a different answer. Every security vendor markets and espouses the virtues of their approach to actionable intelligence, but what is most important is security...
With the increased usage of mobile devices, the IT model is changing and it is important for organizations to provision information on a just-what's-needed, just-in-time basis from centralized servers consolidated in the cloud. However, this must be executed properly to avoid a data breach.
Download this...
Cloud applications and technologies are becoming increasingly mainstream across organizations worldwide: Two-thirds of global executives now have a cloud strategy in place within their organization. While the majority of executives realize the benefits, data security and privacy concerns remain the biggest challenges...
Attackers are leaving no stone unturned, prying into web applications, operating systems and even deeper in the hardware. They're taking advantage of conventional endpoints and mobile devices, slipping past and through network security, and even taking advantage of the human element operating the devices.
In this...
Today, ransomware has emerged as one of the most troublesome malware categories of our time. In this research, Symantec looks at how different types of ransomware work, not just from a technological point of view but also from a psychological viewpoint. The research also examines how these threats evolved, what...
U.S. officials say Russians coordinated an attack on an unclassified Pentagon email system used by the Joint Chiefs of Staff that's been offline since late July, according to NBC News.
Medical billing company Intermedix, part of Advanced Data Processing, faces a lawsuit in the wake of a breach that resulted in a prison sentence for a former employee who pleaded guilty in a tax fraud case. Find out more about this unusual suit targeting a business associate.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.