IT security practitioners should understand why the bits, bytes and network connections - the technologies - are important to their organization's goals. Ignorance of the mission, for IT security folks, isn't bliss.
ISACA has just released a new study about the top vulnerabilities of Web applications. And, according to Sarb Sembhi, the results of this survey just might surprise you.
Harry Raduege sees the nascent field of cyber intelligence as a way for governments and businesses to be proactive, and not reactive, to today's sophisticated digital threats.
Medtronic's announcement that it's launching an "in-depth risk/benefit analysis" following an "ethical hack" of one of its insulin pumps is good news. We hope that Medtronic and all other medical device manufacturers launch long-overdue, aggressive efforts to improve medical device safeguards.
CIOs and CISOs face the overwhelming mission of safeguarding systems and data while fiscal shortfalls force significant consolidation and reengineering of IT programs and services.
Many organizations have the expertise required to implement cyber intelligence but have yet to learn how to integrate those skill sets into an effective, end-to-end process, says Intelligence and National Security Alliance's Terry Roberts.
A hacker anywhere in the world could easily track the whereabouts and file-sharing habits of a Skype user and use the information for purposes of stalking, blackmail or fraud.
The BlackBerry disruption strikes at a core IT security precept: availability. Yet, as cybersecurity and IT architecture practitioner Winn Schwartau points out, it also raises the less-often talked about proposition of accountability.
Instead of sabotage, as Stuxnet was used on Iranian nuclear centrifuges, Duqu is designed to gather intelligence that could help attackers mount a future digital assault on industrial control facilities.
Mike Brown and Amry Junaideen see audits as great tools to promote heftier IT security budgets, substantiating where dollars should be spent to safeguard an organization's information systems and assets.
Investigators have linked a retail-credit scheme to a pair of fraudsters who are believed to have stolen $9 million from 8,000 victims. How could such a scheme go undetected for 15 years?
"This guidance ... will allow the market to evaluate companies in part based on their ability to keep their networks secure," Sen. Jay Rockefeller says. "We want an informed market and informed consumers, and this is how we do it."
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.