For Symantec, the investigation into the Duqu 2 began May 29, when Kaspersky Lab shared samples of the espionage malware - which is based on Flame and Stuxnet - and asked the security researchers to help verify its findings.
Hackers are using medical devices as gateways to launch targeted attacks at hospitals, but there are steps organizations can take to better protect their environments, says Greg Enriquez, CEO of TrapX.
When it comes to advanced threat protection, security leaders increasingly turn to new machine learning solutions. Stephen Newman of Damballa discusses key skills and strategies necessary for success.
Almost all business improvement initiatives can be augmented by a paper-free project, and as we will see in this report, the paybacks can be dramatic in terms of improved response times and greater productivity of back-office staff. Extending capture to mobile devices provides even closer coupling to back-office...
According to various industry articles and vendor marketing materials, most organizations are struggling with the problem of too much electronic data - how much of it there is, what it contains, who has access to it, where it is currently stored, and how long it should be kept. In other words, how to govern it more...
Not only are high-profile healthcare breaches driving home the need for improved security measures, but healthcare mandates are also urging providers and business associates to review their IT infrastructure and upgrade it to maintain compliance.
And 2015 is particularly taxing on the healthcare industry: Half of...
When it comes to advanced threat protection, security leaders increasingly turn to new machine learning solutions. Stephen Newman of Damballa discusses key skills and strategies necessary for success.
This survey examines the costs incurred by organizations after experiencing genuine data loss incidents
Download this informative infographic to learn:
What could a data breach cost you?
How does your industry compare to the cost of a data breach in other industries?
What actions can save you money?
While security attacks on big businesses dominate the headlines, midsized organizations are a highly attractive target for cyber criminals. Unlike large enterprises that have large IT departments with dedicated teams focused solely on security, midsized organizations must protect a growing amount of valuable...
To help protect against the latest advanced threats, many organizations have opted to augment their traditional perimeter defenses (firewalls and anti-virus tools) with point solutions focused on threat detection. But these point solutions often target a single threat vector, leaving the organization exposed to other...
Intel Security cybercrime expert Raj Samani says that after the April disruption of the Beebone botnet by law enforcement agencies, researchers have found more infected nodes than normal, largely in Iran.
How does an advanced threat adversary operate for 10 years, undetected? FireEye APAC CTO Bryce Boland shares details of the decade-long APT30 campaign that targeted organizations in India and Southeast Asia.
At CA Technologies, mobile security is not just a solution for customers; it's a practice that IT security leaders have embraced internally. CA's Robert Primm discusses how to secure a borderless workplace.
For every Sony, Target, or Anthem, dozens of other organizations have had data stolen or corrupted by hackers - or even their own users. Cyberthreats become more sophisticated every year, raising the importance of proper security controls.
Simple passwords, lax system auditing, and overly privileged users leave...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.