The truth about preventing a breach, like the advanced-persistent-threat attack RSA experienced in 2011, is that an organization can't defend critical systems alone, says RSA CISO Eddie Schwartz.
The New England Healthcare Exchange Network, one of the nation's oldest health information exchanges, is continuing to use a federated data architecture model to help protect patient data as it broadens the transactions it accommodates, says Sira Cormier, program director....
ISACA just issued COBIT 5 for Information Security, a business-centric approach to governance and IT management. ISACA's Robert Stroud explains what COBIT 5 means to your organization.
The number of phishing sites is at an all-time high. And so are the targeted brands. The message, says Peter Cassidy of the Anti-Phishing Working Group: "No brand is safe."
When it comes to breach planning and response, well-intentioned organizations often go wrong. Experian Data Breach Resolution VP Michael Bruemmer tells where they fail and offers advice on how to do these important jobs right.
RSA CISO Eddie Schwartz says he spends more time talking to other chief information security officers and IT security practitioners today than he did a decade ago, when he held the same job at Nationwide Insurance Co.
Too many organizations that experience a data breach
fail to reveal information on the cause of the incident so that consumers can take appropriate action, one consumer advocacy group contends.
Acquiring information security wares gets more complicated every day - some 1,000 vendors offer 150 categories of products - so it's unreasonable to expect even the most informed chief information security officers to know everything about them.
John Halamka, M.D., one of the nation's leading healthcare CIOs, says a top compliance project for this summer is improving mobile device security
at Beth Israel Deaconess Medical Center in Boston....
The role of identity and access management is as critical as ever. But the demands of the role? They are radically different, says Sam Curry, CTO of RSA, who discusses the new skills needed.
The UK Information Commissioner's Office has released a new security guide for small and midsized businesses. Simon Rice of the ICO discusses the guide and how to use it to avoid being breached.
Gartner's Tom Scholtz doesn't see a shortage of technically skilled IT security practitioners. But he perceives a dearth of infosec pros who truly understand how security links to an enterprise's business goals.
June has been declared National Internet Safety Month. What is the mission behind the designation, and how can individuals and organizations contribute to the "Stop, Think, Connect" campaign?
Gartner's Peter Firstbrook, to illustrate the vulnerability of IT systems, cites research that pegs at about 400 days the average time a targeted virus remains undetected on a computer. And, he says, that doesn't speak highly of the current offerings from security vendors.
Georgia Tech Research Institute is beta testing a malware intelligence system that research scientist Chris Smoak contends will help corporate and government security officials share information about the attacks they confront.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.