How organizations view security is about to change, says Hugh Thompson of the security firm RSA. He explains why analytics will turn everything we thought we knew about security on its head.
RSA's Art Coviello finds today's cybersecurity strategies to be lacking. Global organizations must rely more on big data and public-private partnerships to defend themselves from advanced threats.
The National Institutes of Health is tackling security challenges as it rolls out many "big data" research endeavors involving human genomes and other sensitive data. Research director Eric Green describes the issues.
The health advocacy group Genetic Alliance on April 5 will unveil a registry designed to enable patients to control how health information is shared with researchers. Spokesman Greg Biggers discusses privacy measures.
What are the common mistakes individuals in organizations make when it comes to data security and breaches? Craig Spiezle of the Online Trust Alliance provides insight from the latest research.
Want to know how predictive analysis could work to defend your IT systems? Take a look at how American Navy SEALS found Osama bin Laden, says Booz Allen Hamilton's Christopher Ling.
Solutionary is out with its 2013 Global Threat Intelligence Report. What are the top four threats to organizations, and how can they be mitigated? Security strategist Don Gray offers insights and tips.
Despite ever-evolving cybersecurity threats, David Knight of Proofpoint says spear phishing attacks are really the greatest worries for most security and risk officers.
Data security used to be about building firewalls and protections around the data. Now it's about securing the data itself. That's why data is the new perimeter, says Charlie Pulfer of Titus.
Most organizations have more data than they know what to do with, much less understand how they can use that data in a meaningful way, say NopSec's Lisa Xu and Steven Leonard. Having the ability to aggregate that data is key.
Most organizations are challenged by having too much information in too many places. But Dieter Schuller of Radiant Logic says centralizing data can improve identity management.
Russ Dietz of Websense likes to ask organizations: Do you really know who has access to your data? The answers often lead to uncovering security vulnerabilities that have been overlooked.
The dynamic evolution of financial fraud creates new opportunities for defensive strategies that employ big data and analytics. Terry Austin of Guardian Analytics discusses new threats and solutions.
Data-centric security: It's a shift from securing where data resides to securing the data itself. Matt Pauker of Voltage Security tells how this approach helps organizations improve their security posture.
IBM, Lockheed Martin and Fixmo are among the organizations to issue product/solution news releases in advance of RSA Conference 2013. See the latest announcements for the show.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.