The chief operating officer of an Atlanta-based cybersecurity firm has pleaded guilty and agreed to pay restitution of more than $818,000 in a federal criminal case in which he admitted hacking a Georgia medical center in 2018 in an effort to drum up business for his company.
Federal regulators issued new guidance materials for HIPAA-regulated entities, including a document stressing the importance of sanction policies for workforce members who violate HIPAA, plus two new resources for healthcare providers and patients regarding telehealth privacy and security risks.
A human cyber risk factor increases or decreases the chance of a person becoming a victim of a cyber attack.
Many organizations are moving too slowly towards addressing the human risk elements of security. At the heart of this lies an misunderstanding of human risk factors - with many believing the only...
Being an independent firm under TPG's ownership will allow Forcepoint G2CI to invest in defense-grade cyber tools such as insider threats and content disarm and reconstruction. Separating Forcepoint's government security practice will allow it to focus on secure remote access to classified networks.
Executives and board members always want the answer to be “yes,” but CISOs know it’s irresponsible to make such a blanket statement. An adversary could be any potential threat — whether external or internal, intentional or unintentional. So, the question CISOs should be answering is: “Are we...
Insider threats continue to pose significant concerns in today's digital landscape. While malicious insiders have garnered attention due to harmful intent, negligent users often make unintentional mistakes, contributing to potential cybersecurity risks.
As the threat landscape continues to evolve, defenders need to shift their focus from individual wins to sustained proactive defenses. Resecurity COO Shawn Loveland proposes embracing a strategy of understanding and fighting adversaries in a constantly changing space - with no beginning and no end.
Cyberattacks are constantly evolving, and it's important to stay ahead of the curve.
Empower your users to disrupt the attack chain, equipped to identify and thwart cyber threats. This distinctive people-centric kit ensures education, arming users to counter real-world risks.
In honor of Cybersecurity Awareness...
Finite resources and the continual urgency to prioritize alerts and make effective decisions puts many security teams under increasing pressure. One wrong decision at a strategic or operational level can impact the business with costly consequences.
Download this guide to learn how to:
Provide meaningful context to...
A global report, conducted by Sapio Research, surveying 2,000 security analysts about the state of threat detection in 2023.
Find out why:
More attack surfaces mean more alerts and more costs
More tools mean more blind spots and more team burnout
More inefficiencies, ineffectiveness means more breaches
Human Factor Security expert Robin Lennon Bylenga advised that in building an internal threat management program, it is imperative to not send mixed messages to the broader workforce. It's wise to conduct an assessment of human risk - not just IT risk, she said.
Malicious insiders and compromised credentials are threats that often go undetected by traditional security tools. User and entity behavior analytics (UEBA) analyzes behavior in organizations’ environments to set a baseline for normal and detect anomalies that indicate real threats in need of investigating.
This...
Do you know what the biggest threat is to your organization? The answer may surprise you. It’s your own employees, contractors, and other insiders. These trusted insiders have authorized access to sensitive information and can cause significant harm to your organization, whether they mean to or not. Insider threats...
Watch this 30-minute webinar to explore some of the headline-grabbing incidents that illustrate the rapidly increasing problem of data loss and insider threats. You’ll gain valuable insights into best practices for managing insider threats and risks to your organization.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.