To help deal with the coronavirus outbreak, healthcare providers are examining how to implement or expand the use of telehealth services to remotely evaluate and care for patients. But these providers need to carefully consider privacy and security issues as they work to quickly offer these services.
As enterprises increasingly enter the evolving multi-cloud environment, how should they re-think their approach to network detection and response? Ryan Davis of ExtraHop shares insight on how to navigate this new landscape.
The RSA cybersecurity conference once again this year gathered tens of thousands of individuals to network and attend keynotes and briefings on topics ranging from election security and genomics to privacy and cybercrime. Here are 20 visual highlights from this year's event.
The U.S. is better prepared to respond to election interference and related cybersecurity issues than it was four years ago, several security professionals, including one of the FBI's top experts, tell Information Security Media Group.
The state of endpoint security might appear good at first glance, but look below the surface and the situation may not be as rosy as it seems, says Christy Wyatt, CEO of Absolute, based on her company's new "2020 Endpoint Resilience Report."
Wall Street has been hit by the twin threats of the new coronavirus as well as oil prices plummeting, with the Dow dropping 2,000 points on Monday for its worst day in 12 years. Amidst fears that a recession could tank the global economy, some experts still see upsides for the cybersecurity sector.
Mobility, connectivity and the infrastructure-less IT environment - they add new degrees of difficulty to cybersecurity. Michael Covington of Wandera shares strategies for securing this modern workplace.
Joseph Krull, an analyst with Aite Group recommends that vendors at RSA Conference should focus on how they integrate with the life of a CISO, rather than fixing point solutions.
The latest edition of the ISMG Security Report discusses the developing definition of "Insider Risk." Plus, Former DHS Secretary Michael Chertoff on U.S. 5G rollout plans; Cloud Security Alliance on containers and microservices.
Ten years since he coined the term "zero trust," John Kindervag, field CTO of Palo Alto Networks, sees CISOs increasingly being faced with the challenge of having to implement the "never trust, always verify" model across increasingly complex IT environments, including cloud and IoT.
In a multi-cloud environment, where apps, services and connected devices rule the landscape, the security organization has to interact differently with operations. Bryce Hein of ExtraHop tells how.
The Cryptographer's Panel, which sees five cryptography experts analyze and debate top trends, remains a highlight of the annual RSA conference. For 2020, the panel focused on such topics as facial recognition, election integrity and the never-ending crypto wars, while giving shout-outs to bitcoin and blockchain.
Federal regulators say newly identified cybersecurity vulnerabilities dubbed "SweynTooth" could pose risks to certain internet of things devices, including wearable health gear and medical devices, as well as "smart home" products from vendors who use Bluetooth Low Energy, or BLE, wireless communication tech.
In response to White House warnings that 5G infrastructure equipment built by Huawei could be subverted by China to conduct espionage, Andy Purdy of Huawei Technologies USA says his company has pledged full transparency and urges competitors to follow suit.
Today's security practitioners need to fuse cybersecurity with compliance and privacy. Stacy Scott and Alan Brill of Kroll discuss a defensible security strategy.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.