The old, standard dashboards are no longer sufficient. To be truly effective, network pros now need new data to help find and resolve network security issues, says Mike Heumann of Emulex.
Individuals resort to lying about themselves to protect their identities when accessing systems in today's imperfect cyber world, says Peter Tapling, president of Authentify, an out-of-band authentication service.
Microsoft has issued a fix for the Internet Explorer bug, including an update for Windows XP users. The update repairs a vulnerability in the browser that could allow hackers to gain control of a user's computer.
Organizations across all industry sectors understand the importance of information security. But turning security awareness into meaningful action - that's the challenge that many midsized entities face, says Sophos' Nick Bray.
Cloud-based advanced threat protection helps organizations detect sophisticated malware that is able to bypass existing security measures. The key is to start with the premise that the network is already infected, says Seculert's Dudi Matot.
Organizations and security threats have changed dramatically, but many information security strategies have not - and that is a huge problem, says SafeNet's Jason Hart.
Understanding the behavior patterns of individuals with access to an organization's most important credentials is one of the keys to privileged management, says CyberArk's Matt Middleton-Leal.
Faced with a vulnerability that exposes Microsoft's Internet Explorer Web browser to a zero-day exploit involved in recent targeted attacks, CISOs need to take prompt action, security specialists say. Learn the steps they recommend.
The burden of complying with regulations can be stressful, but the cost of a breach is too high to ignore.
Whether you are a HIPAA-covered entity or business associate, the changes to HIPAA through the HITECH Act have expanded the privacy and security regulations affecting your organization, as well as penalties...
Data exfiltration, network breach, identity theft, brand defacement... Enterprises are under attack. Traditional security methods have been unable to keep up with hackers in today's changing application environment. The success of improved network security products together with the increased attack surface...
Fraud Summit - San Francisco 2014 - It has been nearly three years since the FFIEC issued updated guidance aimed in part at curtailing incidents of corporate account takeover. Yet, banking/security leaders today say their current anti-fraud investments have done little to reduce fraud incidents or losses. Register for...
Fraud Summit - San Francisco 2014 - The hackers get the headlines, but behind the scenes the stealthy insiders continue to pose huge fraud risks to banking institutions. And often the fraudsters are senior, trusted employees with privileged access to accounts and competitive data. Register for this session to learn...
Fraud Summit - San Francisco 2014 - Banking institutions create and store volumes of data, but integrating and applying that information in a meaningful way has proved challenging. Register for this session to learn first-hand from bit data and analytics experts:
How big data is being used to analyze and detect...
Fraud Summit - San Francisco 2014 - What becomes of customer account information once it is stolen by fraudsters? It enters a sophisticated underground economy, where account names and numbers are sold openly in the criminal marketplace. Underground market trends often yield clues to undiscovered breaches or targets....
Fraud Summit - San Francisco 2014 - Could artificial intelligence have been used to prevent the high-profile Target breach? The concept is not so far-fetched. Organizations such as MasterCard and RBS WorldPay have long relied on artificial intelligence to detect fraudulent transaction patterns and prevent card fraud....
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.