Security product testers have architectured their test suites to adhere to the technologies of the past 10 years. However, as endpoint security and the threat landscape continue to evolve, so must testing suites evolve as well. Advanced methodologies and a more robust testing criteria are essential to keep...
Implementing robust access controls in healthcare settings can be particularly challenging for several reasons. But Fisher-Titus Medical Center is making progress in strengthening authentication and other security controls, says Peter Jacob, the hospital's manager of IT operations.
"Next-generation" endpoint protection, or next-gen AV, has been getting a lot of press recently. But what does the term actually mean?
For IT security managers under pressure, the most important thing isn't the latest buzzword, but finding a solution which is effective in protecting their organization from an...
The notion of "next-gen" is now promoted by some providers of endpoint security software as a way to improve the efficacy of protecting endpoints from compromise, given the prominent role endpoints play in cybersecurity attacks, the ways in which mobility and cloud apps have expanded the attack surface area, and the...
High-profile, targeted attacks from malicious actors now occur with frightening and increasing regularity. This evolution of advanced threats overwhelms both IT organizational bandwidth and the capabilities of legacy antivirus tactics, particularly as the increasing number of endpoint devices used by employees expands...
The endpoint security market is growing because more security professionals see the endpoint security suite vendors as a way to address their top challenges. What's more, security pros increasingly trust providers in this space to act as strategic partners, advising them on top endpoint security decisions.
The...
The security landscape changed dramatically with the maturation of crypto-ransomware in 2014. Not only did this new type of malware bring about a more lucrative business model for attackers, it also spurred the adoption of many so-called 'next-gen' endpoint security techniques.
While these techniques bring...
Poor firewall management defeats the firewall's intended purpose of access control by becoming ineffective and limiting visibility into what access is actually permitted. Poor management also increases the cost associated with security management.
The results of poor firewall policy management include unnecessary...
To meet the increasing customer demands for effective solutions, security vendors must ensure their products work together well, says Dr. Mike Lloyd of RedSeal. This is particularly essential to achieving "digital resilience," the ability to promptly detect and respond to network intrusions, he says.
Today's threat landscape constantly throws new problems at organizations already struggling to keep up with yesterday's issues. New malware, ransomware, botnets, and fileless attacks target a growing list of enterprise vulnerabilities with clever new exploits and social engineering tactics, and these attacks are...
While security teams continue to add to their threat protection arsenal, they are struggling to keep up with the threats. Security information and event management (SIEM) products, threat analytics platforms, advanced endpoint protection (AEP) products, user entity behavior analytics (UEBA) tools, and incident...
Advanced endpoint protection (AEP) shows significant promise for protecting endpoint devices. However, this emerging market is rapidly growing and is in a constant state of flux.
Assessing new technologies is no small undertaking and analysts must often rely on comparing limited information from less-than-ideal...
CISOs and security analysts alike complain that security information and event management (SIEM) technology has not fully lived up to its promises. Even with SIEM systems in place, enterprises still suffer from alert fatigue, and security teams armed with SIEM event and flow data still miss untold numbers of attack...
Attackers continue to target enterprise assets both from outside and - too often - inside the corporate perimeter. To help, more organizations are turning to software-defined secure networks, says Mihir Maniar of Juniper Networks.
The uptick of ransomware and other cyberattacks in the healthcare sector has prompted healthcare provider RWJBarnabas Health to make a number of important moves to help prevent, detect and respond to breaches, says CISO Hussein Syed.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.