While U.S. agencies and enterprises increasingly understand the nation-state cyber threat, they are woefully unprepared to respond to a sustained attack, says former State Department adviser Morgan Wright. What are we overlooking?
When it comes to building an effective cybersecurity team, it isn't just about acquiring the right technology and business skills, says LinkedIn CISO Cory Scott. It's also about obtaining the right people who have defined their own personal narrative.
Social engineering attacks, including ransomware, business email compromise and phishing, are a problem that can never be solved, but rather only managed via a continued focus on security awareness training, says Stu Sjouwerman, CEO of KnowBe4.
It's a quandary: How does one convey the urgency of cybersecurity without falling into the trap of spreading fear, uncertainty and doubt? Diana Kelley, cybersecurity field CTO at Microsoft, shares strategies.
What are the strengths and weaknesses of U.S. federal security strategy? Sean Frazier of Duo Security, provides an assessment and addresses why adaptation to the cloud is paramount.
As GDPR and other global regulations put a premium on data governance, organizations focus increasingly on the evolution of data loss prevention. Dave Karp of Digital Guardian outlines what this means.
Venture capital firm Trident Cybersecurity has rebranded itself as ForgePoint Capital, and Managing Director Alberto Yepez says he is bullish on the market and its emerging focus on the intelligence operations center.
Security leaders need to embrace security change to overcome failing architectures that have evolved over the last decade, says Tom Kellermann, chief cybersecurity officer at Carbon Black.
The U.S. and U.K. warned Monday that Russian hackers have compromised critical internet infrastructure with the aim of spying, extracting intellectual property and gaining footholds for future cyberattacks.
Security researchers are claiming at least a temporary victory over an enormously productive malware distribution scheme that shuffled as many as 2 million users a day from legitimate websites to malware.
What's the difference between artificial intelligence, machine learning, deep learning and neural networks? Don't trust vendors' marketing materials to help you find a workable, accurate definition, says Kris Lovejoy, CEO of the security firm BluVector.
To stay ahead of evolving cyber threats, healthcare entities need to deploy a defense-in-depth strategy that includes tapping more advanced tools, including deception technology, says security expert Elie Nasrallah of HITRUST.
Unauthorized access to an employee's email account has resulted in a breach affecting 30,000 current and former rental customers of Inogen, a maker and supplier of oxygen equipment, which notes that its insurance may not cover all related costs.
Uber has agreed to stricter monitoring by the U.S. Federal Trade Commission following its concealment of a 2016 data breach while it was negotiating with the agency for a settlement tied to a separate, yet similar, breach two years prior.
Email is still the most common attack vector as a preferred method utilized by attackers because of the overwhelming effectiveness. Phishing attacks have only been increasing and evolving to bypass modern security appliances, endpoint protection, and user awareness training.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.