Few internet-connected devices are built to be secure by default, and the problem is getting worse because many devices are connecting to poorly secured cloud services, says Ken Munro of Pen Test Partners.
Today's workforce is increasingly working remotely and relying on a variety of devices and cloud services to accomplish their jobs. Organizations must support but also secure this push, or they risk driving employees to adopt shadow IT, warns Jon Oberheide of Duo Security.
If you had to guess what day of the week a hacker will hit your organization, the answer might seem obvious: Hackers prefer to strike on Saturday. And a review by Redscan of cybersecurity incidents reported to Britain's privacy regulator before GDPR took effect confirms it.
Verifications.io, a self-described "big data email verification platform," has suffered a massive breach. Security researcher Bob Diachenko said he discovered the site was exposing 763 million records.
Evolving from endpoint detection and response, security vendor Nyotron has a new approach called endpoint prevention and response. What's the distinction? CTO Nir Gaist explains the strategy.
Citrix Systems is investigating a suspected hack attack, resulting in the theft of business documents, after being tipped off by the FBI. The breach alert follows Citrix recently disclosing that in late 2018, hackers breached some of its customers' accounts via credential-stuffing attacks.
CISOs need to work with partners in other departments to help ensure the success of major security projects, says John Pescatore, the director of the SANS Institute, who spoke at RSA Conference 2019.
The latest edition of the ISMG Security Report features updates from RSA Conference 2019 on IoT and the cloud, GDPR compliance challenges and much more.
To help ensure that their sensitive data cannot be exfiltrated, some organizations have adopted data diodes, which are hardware devices designed to provide a one-way link to stop exfiltration or block remote attackers, says Mike Timan of Owl Cyber Defense.
Autonomous vehicles are coming, but can we trust them? Summer Craze Fowler of Argo AI explains how "prosilience" is key to the future of self-driving cars and IoT.
Many breached businesses lack the foundational controls that would have helped to prevent a data breach, says Piero DePaoli, senior director of security and risk at ServiceNow.
Information technology and operational technology are converging as industrial devices become connected. Damiano Bolzoni of Forescout discusses the emerging cyber implications.
The network is much more than just the sum of its endpoints, and the imperative to secure everything has led to detection and response emerging as a top priority for many organizations, says Chris Morales of Vectra Networks.
At the start of RSA Conference 2019, Jon Callas of the ACLU discusses how attitudes toward privacy continue to evolve and why the general tenor of the conversation is not as bad as some headlines suggest.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.