Election security improvements, the push for all software to ship with a "bill of materials" and the results of a long-running investigation into a lucrative digital advertising scam are among the latest cybersecurity topics to be featured for analysis by a panel of Information Security Media Group editors.
The White House has written to business leaders, urging them to prioritize having robust ransomware defenses in place. The move comes as the Biden administration pursues multiple strategies to combat ransomware and digital extortion, including ordering a new task force to coordinate all federal investigations.
Threat actors are focusing a lot on Active Directory today as it is a path for them to reach an organisations key data & applications. The versatility of Active Directory makes it a crucial target for hackers. Organisations learn new ways on how to protect this valuable target and mitigate the risks. Organisations...
Discover how modern organizations are accelerating machine learning projects with the security features of Amazon SageMaker to achieve business impact faster.
Read the e-book to learn more about how to:
Meet the strict security requirements of machine learning workloads
Secure datasets through every step of...
The explosion of mobile and cloud technologies has dissolved the traditional perimeter. Whether you’re handling transactional or personal data, it’s critical that it is gathered ethically, managed with integrity, and properly safeguarded. When people are the perimeter, identity becomes the foundation of a Zero...
Remote work is changing the landscape of how businesses get work done as they move from an in-office work culture to a work-from-anywhere one. The COVID-19 pandemic has only accelerated this change. Is your business prepared to enable employees to securely collaborate while being physically apart?
View this...
The world of work has changed, yes, but the end goal of getting work done has not. As businesses shift their strategies to allow for long-term remote or hybrid work, the challenge of giving employees access to their work apps and tools in a way that is both secure and efficient is more critical than ever. While there...
The FBI is warning healthcare organizations and first-responder networks about Conti ransomware attacks, advising them to take measures to help prevent becoming a victim.
Passwordless authentication: Has its time finally arrived? J. Wolfgang Goerlich of Cisco talks about why now is the time to go passwordless, as well as which final obstacles need to be cleared to replace legacy authentication methods.
Multi-Factor Authentication (MFA) can be a highly effective way to safeguard your organization’s data, but that doesn’t mean it’s unhackable. And nobody knows that better than award-winning author and Data-Driven Defense Evangelist at KnowBe4, Roger Grimes. While researching his most recent book Hacking...
No script, no filter: Just Microsoft’s Edna Conway and Cisco’s Wendy Nather gathering with privacy leader Michelle Dennedy to discuss the impact of the SolarWinds supply chain attack and to play Buzzword Mystery Date with SASE, CIAM and "passwordless" authentication - are these trends dreamboats or duds?
Four editors at Information Security Media Group discuss important cybersecurity issues, including dealing with attacks targeting the aging Accellion File Transfer appliance and taking steps to enhance employee authentication.
An attacker added a backdoor to the source code for PHP, an open-source, server-side scripting language used by more than 75% of the world's websites. Core PHP project members say the backdoor was quickly removed.
Many organizations have updated the authentication process for customers to help ensure frictionless transactions. Now, some are starting to take similar steps to streamline and enhance authentication of their employees - especially those working remotely.
Passwords are a problem. 95% of IT professionals agree there are risks to using passwords, and 92% see passwordless authentication in their organization’s future. Is going passwordless the right solution for businesses tackling the password problem?
Download the report to:
Dive into where the largest password...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.