FS-ISAC has teamed up with the Depository Trust and Clearing Corp. to offer software designed to ease cyberthreat information collection and sharing, helping safeguard against cyber-attacks.
Security firms McAfee and Symantec have joined the Cyber Threat Alliance, which was launched by Fortinet and Palo Alto Networks in May as a way to share threat intelligence.
The 9/11 Commission, in its 10th anniversary report, cautions Americans and the U.S. government to treat cyberthreats more seriously than they did terrorist threats in the days and weeks before Sept. 11, 2001.
Attacks are more frequent, severe and complex. How can security pros defend against the entire attack continuum - before, during and after? Cisco's Bret Hartman describes a threat-centric approach.
"United we stand; divided we fall." That's the message from Art Coviello to kick off the 2014 RSA Conference Asia Pacific & Japan in Singapore. What advice does the RSA chair offer to global security leaders?
Since the beginning of web application delivery, there has been an opportunity for fraudsters to get into the middle of a transaction and impersonate the legitimate user. Since the credentials used for this fraud are valid and "expected to be under the control of the real user," this type of impersonation has been...
Users spend, on average, 82% of their mobile minutes with apps and just 18% with web browsers. It's the lean, restricted functionality of mobile apps that makes them both convenient and task-oriented - and a major reason why they're so attractive to consumers and businesses. But mobile app development and the...
The trends impacting business today-cloud adoption, increased mobility, rise of social media and the increased amount of online data sharing- make the need for strong authentication more important than ever.
The IT department can no longer firmly establish a network perimeter and rely on simple username and...
IT and the business are being impacted by many important trends-cloud adoption, increased mobility, the rise of social media, and the increasing flow of information across the extended enterprise. The old network perimeter is no longer relevant. Today's IT must deal with highly distributed identities across the...
"Trust" does not mean giving employees unrestricted and unnecessary access to information. With the right security controls, organizations can significantly reduce their exposure to the risk of insider threats. The key is to find the right balance between employee enablement and control, while holding employees...
The traditional dangers IT security teams have been facing and overcoming for years are being replaced by a far more hazardous, insidious form of attack: the Advanced Persistent Threat (APT).
Although APTs are an emerging threat vector, their impact has already been felt in substantial ways.
This white paper...
Schools are embracing the use of technology to cut costs, to perform research, roll out computer-based classes and exercises and to compete for students. At the same time, the school administration is being asked by parents, state, local, regional or even federal governments to make sure that students and faculty are...
Browser-based filesharing applications have made moving large files a very simple task for the masses. Large graphics files that cannot be sent via email due to size restrictions can now be transmitted using YouSendIt! or drop.box. These applications are easier to use than FTP and the risk of inadvertent sharing of...
Mobile file sharing has become a necessity for today's enterprises. Nearly all workers are mobile, and most workers are carrying three mobile devices, including a smartphone and a tablet. To stay productive, workers need access to all their files on all their devices. They also need to be able to share files...
The typical mobile worker is carrying three or more mobile devices, at least one of which is a personal device brought from home. Organizations need to protect their data on every mobile device it resides. Unfortunately, enterprise mobile security falls short much of the time.
Download this white paper to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.