Mobile security, advanced persistent threat and DDoS attacks on banks have been among the hottest security stories. How have they influenced RSA Conference 2013? Program Chair Hugh Thompson previews the event.
Intrusion detection is challenging for most organizations, and hackers' ever-increasing skill to evade monitoring tools only compounds the problem. But Zions Bank's Michael Fowkes says big data can help.
Organizations typically secure data where it resides and is transmitted. Data-centric security strategies focus on securing the data itself. Mark Bower of Voltage Security explains.
Managing advanced persistent threats will be a priority throughout 2013, says RSA CISO Eddie Schwartz. How should organizations defend themselves against APTs and the year's other top security threats?
As the National Institutes of Health ramps up research projects involving human genomes, electronic health records and other sensitive data, it's exploring the best ways to protect that data, says research director Eric Green, M.D., PhD.
ENISA, the European Union cyber-agency, is out with its first-ever Threat Landscape report. What are the emerging threats and vulnerabilities, and how should organizations globally respond to them?
An evolving concept known as "intelligent security" involves using a combination of technologies to detect threats, helping security professionals become more proactive. Learn how pioneers are using the new approach.
CISOs' top three priorities for 2013 are emerging threats, technology trends and filling security gaps, says RSA CISO Eddie Schwartz. But what new strategies should leaders employ to tackle these challenges?
Post-Superstorm Sandy, as security pros prepare for disasters, they must consider the integrity and availability of data - an often overlooked business continuity element, says Alan Berman of DRI.
The Department of Homeland Security is testing whether data from social media sites can help identify public health issues, such as infectious disease outbreaks and bioterrorism. Learn about the strategy.
Human genome sequencing can support groundbreaking research leading to improved treatments. But before genetic testing can become common, privacy issues need to be tackled, says Lisa M. Lee, who heads a presidential advisory panel.
To address the security and privacy challenges magnified by the velocity, volume and variety of big data, the Cloud Security Alliance has formed a big data working group. What are the group's objectives?
A shift to context-aware information security will drive the big data trend and aid in better defending against threats. Gartner analyst Neil MacDonald explains how.
The great thing about fraud examination is that you can really play to your own strengths when choosing a career. The following six job roles are just a few of the career paths a fraud examiner might take.
Organizations using semantics and big data tools are creating a new position called data scientist to help uncover fraud and identify undetected vulnerabilities. Here are profiles of three leaders who have embraced this role.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.