As researchers scramble to learn more about Shellshock and the risks it poses to operating systems, servers and devices, Michael Smith of Akamai explains why not all patches are actually fixing the problem.
As threats continue to penetrate networks, organizations need to find new ways to defend against them. NSS Labs recently conducted the most rigorous next generation firewall (NGFW) testing to date.
The NSS Labs NGFW reports provide the details on how Cisco models achieved:
Consistent, industry-leading...
This infographic hightlights a specific example of attackers targeting a feature within Microsoft Word - Visual Basic Scripting for Applications. While basic, the Office Macro attack vector is obviously still working quite effectively. When the victim opens the Word document, an On-Open macro fires, which results in...
Credit rating models transformed the way we do business and have existed for almost a century. Now, these same models are inspiring a new way of managing vendor security risk by using externally collected security data to assess and quantify security performance.
Download this white paper to learn:
The...
In this ESG Brief, Jon Oltsik, Senior Principle Analyst at Enterprise Strategy Group, explores the enterprise need for objective security performance metrics in order to identify, quantify and mitigate cyber risk across the business ecosystem.
Download this paper to learn how Security Ratings are providing...
Weill Cornell Medical College, which is part of Cornell University, ranks among the top clinical and medical research centers in the country. With some 7,000 faculty, staff and students, as well as approximately 2.5 million patients under its care, the medical college also ranks as a big target for...
Very few businesses operate today without sharing sensitive data with business partners, suppliers, and service providers. This presents new challenges to vendor risk management teams as they face the issue of keeping this data secure as it enters the extended enterprise. Without visibility into and control over these...
With the rise of the data-centric enterprise, there is a necessary and parallel development of the security architecture meant to protect it. But in the time it's taken for data security to catch up with the changing datascape, organizations have found their compliance and data protection programs...
Considering healthcare's recent track record of frequent data breaches, organizations must take steps to mitigate the risks posed by the Bash flaws known as Shellshock now to help avoid becoming the next victim of a hacker attack.
A dispute involving an EHR vendor that allegedly locked out a small clinic's access to patient data illustrates why healthcare organizations need to carefully scrutinize the HIPAA-related fine print in their business associate contracts.
The automated version of the IT risk management and governance framework should save project leaders 30 to 60 hours of work over a manual process of building a secure IT system, ISACA President Robert Stroud says.
Firewalls enforce network access via a positive control model, where only specific traffic defined in policies is granted access to the network while all other traffic is denied. Access Control Lists (ACLs) initially performed this functionality, often in routers, but their rudimentary approach gave way to dedicated...
APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cyber-criminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been...
Cybersecurity has become a leading topic both within and beyond the corporate boardroom. To stop the escalation of cyber attacks, enterprises need a network security approach that is designed from the outset to enable the safe use of the applications and technologies required to support a thriving business.
This...
Effectively stopping advanced threats requires a new approach to security. Find out the 10 must-haves for security products today.
In this e-Book, you will find insightful and practical advice on:
The why and how of next-generation security;
10 critical functions your network security and your firewall...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.