Amidst the increasing security chaos facing individuals and organizations, one of the dominant themes at this year's RSA Conference was the need for information security professionals to do more, bringing order to enterprise IT security as well as by influencing public policy.
Chris Pierson of Viewpost offers an assessment of the impact the Trump administration could have on cybersecurity in the government and private sectors and sizes up the role of emerging technologies.
This edition of the ISMG Security Report features updates from RSA Conference 2017 on emerging technologies, the forthcoming White House cybersecurity executive order and Microsoft's call for a "Digital Geneva Convention."
The threat landscape for financial institutions has changed considerably since the DDoS attacks of 2012. Rich Bolstridge of Akamai Technologies tells how the definition of "adequate cybersecurity" has also shifted.
Europe's GDPR has business leaders everywhere talking about privacy. But are they having the right conversations? Michelle Dennedy, chief privacy officer at Cisco, offers her perspective.
The best starting point for effectively safeguarding data and protecting against breaches is to clearly understand what kind of data an organization has, where it's located and the risks, says Jason Hart of Gemalto.
Entities across all industry sectors appreciate the need for ensuring secure relationships with their third-party service providers. Jasson Casey of SecurityScorecard discusses new solutions for achieving those secure relationships.
Vishal Salvi is a security leader who has worked in business, left to be a consultant, and now returned to business again. What new perspectives does he bring to his role as CISO at IT services firm Infosys?
The Healthcare Information and Management Systems Society's 2017 Conference will offer a slew of educational sessions and informative exhibits focused on top cybersecurity and data privacy challenges facing the healthcare sector. Catch our coverage.
As RSA Conference 2017 winds down and Information Security Media Group's series of exclusive video interviews wrap up, editors Tracy Kitten and Tom Field share their key takeaways from perhaps the busiest day of the event.
As third-party vendor relationships become more complex and dynamic, organizations need to rethink the way they approach their vendor risk management strategies, says Stephen Boyer of Bitsight.
Easy Solutions' Ricardo Villadiego addresses how the digital revolution, millennials and the pervasive use of online communications affect financial fraud.
Conventional wisdom has long held that humans, because of the mistakes they make, are the weakest links in the security chain. But that's not so, says Rohyt Belani of PhishMe, who explains why.
In today's threat landscape, why do we need a "cognitive" security operations center? Denis Kennelly of IBM Security defines the term and makes the case for taking action.
Phil Reitinger, CEO of the Global Cyber Alliance, a group he describes as a "coalition of the angry," describes how it has channeled this anger into action and tells why he believes the U.S. is in step one of a 12-step cybersecurity program.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.