Dr. Zulfikar Ramzan is the new CTO at RSA, and he's focused on advanced threats. What are the technology nuances behind today's top threats, and how can organizations best defend themselves?
Legislation to encourage businesses to share voluntarily cyberthreat information with the federal government by giving them liability protection has won overwhelming approval by the House of Representatives.
Some Medicare administrative contractors have made improvements in their information security programs, but most still have a way to go in closing a number of key gaps, according to a new government watchdog report. Find out the areas of concern.
How badly does the president want Congress to enact cyberthreat information-sharing legislation? Despite concerns over provisions of two bills, the White House isn't threatening vetoes as it did in previous congresses when raising similar objections.
The Department of Homeland Security will establish a Silicon Valley satellite office to improve relations with IT security vendors and recruit cybersecurity talent, Homeland Security Secretary Jeh Johnson said in a keynote address at RSA Conference 2015.
The threat landscape is constantly changing, and so is the information deemed valuable to hackers. Tom Kellermann of Trend Micro discusses how organizations can improve how they protect data.
Stronger authentication is just a piece of the fraud-prevention puzzle. Emphasis is now being placed on back-end analytics and monitoring that remove the user from the process, says Bryan Jardine of Easy Solutions.
As security threats evolve, so do the market and maturity of managed security services. Court Little of Solutionary discusses the new demand for managed services - and how organizations can get the most from them.
Threat intelligence and information sharing - the quickly emerged as dominating topics at RSA Conference 2015. ISMG's executive editors share their takeaways from the first half of the week-long event.
Europe does not know the true extent of its data breach problem, says Europol advisor Brian Honan, owing to the lack of a U.S.-style breach notification law to alert European consumers when their data has been stolen or exposed.
The Internet as we know it may be heading toward fundamental changes in the coming decade as a result of an intense privacy debate, says Internet pioneer and DNS guru, Dr. Paul Vixie. Find out his predictions.
President Obama has signed a bill that provides $320 million in funding to remove Social Security numbers from Medicare ID cards in an effort to fight identity theft and fraud. Find out the time line.
Direct from the show floor at the Moscone Center in San Francisco, ISMG offers for the first time ever a live streaming video feed of exclusive interviews with the world's top information security leaders.
At the heart of recent high-profile breaches ... is phishing. Why can't we get a handle on these schemes and get better at stopping them? PhishMe CEO Rohyt Belani on how to strengthen security's weakest link.
The future of cybersecurity may be full of surprises. But these twists will cause a big sensation, says Christofer Hoff, vice president and chief technology officer at Juniper Networks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.