Great news: "SunTrust to offer free identity protection ... at no cost on an ongoing basis." Of course, nothing comes for free, at least for 1.5 million customers of the Atlanta bank, whose personal details may have been sold to criminals by a former employee.
Deception technology - which involves tricking hackers into lurking on bogus IT assets - can provide crucial intelligence on methods and motives. But is the technology worth the investment?
For years, Dawn Cappelli studied and wrote about the insider threat. Then she went to Rockwell Automation and built an insider program. She discusses the program's success and her expanded role as vice president and CISO.
As the world prepares for GDPR enforcement, a new Privacy Maturity Benchmark study finds that 65 percent of respondents say their organizations experience sales delays because of data privacy issues. Cisco's Michelle Dennedy outlines the concept of data friction.
Deception is probably the least complicated way to detect threats that slip past perimeter defenses, says Ofer Israeli, CEO and founder of Illusive Networks.
British teenager Kane Gamble has been sentenced to serve two years in a youth detention center after he admitted to targeting U.S. officials - including hacking former CIA Director John Brennan's personal AOL email account - as well as dumping personal details for 20,000 FBI employees.
The average tenure of a CISO can be brief - especially in the wake of a breach. What should security leaders do from day one to get a good handle on the job? Joel de la Garza, CISO of Box, offers career advice.
Organizations across regions and sectors are rapidly adopting the NIST cybersecurity framework, and Symantec has embraced it internally and for external clients. Symantec's Ken Durbin discusses the benefits.
The endpoint remains the favored attack surface for criminals, yet most cybersecurity solutions rely on detection rather than prevention, says Gregory Webb, CEO of Bromium.
It's not just that threat actors are multiplying - it's that they have evolved to unleash a fifth generation of cyberattacks, says Peter Alexander of Check Point Software Technologies. And most enterprises are ill prepared to detect or respond to these attacks.
Identity is changing with the fusion of public and private trust models. Entrust Datacard's Ray Wizbowski discusses the shifting landscape and how best to secure it.
Organizations understand and appreciate the efficiencies and cost savings of moving to the cloud. But what are the potential impediments they often overlook? Peter Martini of iboss offers guidance.
The potential for DDoS attacks expands exponentially with IoT and digital currencies. But how significant is this DDoS threat? Leen Chen of A10 Networks offers an analysis.
Data integrity and privacy issues are among potential concerns related to voice-activated "virtual assistant" tools that some vendors are beginning to offer for their electronic health record systems, says privacy and security expert Kate Borten.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.