Cisco has launched a new open source initiative focused on application identification, says Scott Harrell, vice president of the company's security business group.
Simple credentials, such as passwords, are a hacker's best friend, says Phillip Dunkelberger of Nok Nok Labs, a founding member of the FIDO Alliance. That's why the alliance is working to reduce reliance on passwords by enabling advanced authentication.
CipherCloud's Paige Leidig discusses a new offering that helps enable organizations rapidly adopt a cloud application as it protects sensitive data and ensures compliance to policies and regulations.
Advanced, ever-evolving threats call for security solutions vendors to counter with equally advanced and sophisticated solutions. JD Sherry of Trend Micro discusses new strategic alliances and product sets dedicated to creating new measures of threat defense.
Improving the security of medical devices requires the collaboration of healthcare organizations, manufacturers, regulators and patients, says researcher Ryan Kastner, who outlines action items.
Neiman Marcus has revised downward its estimate of the number of payment cards compromised in its breach last year. Company CEO Karen Katz offers new details.
Two critical steps that banking institutions need to take in 2014 to help prevent fraud are implementing big data analytics and adopting far more sophisticated customer and employee authentication, says Gartner analyst Avivah Litan.
Dan Clements of IntelCrawler, the research firm that claims it traced malware apparently used in the Target breach and other retailer attacks, outlines steps merchants, banks and others should take to secure their networks.
Because of concerns of possible National Security Agency meddling with its cryptographic standards, NIST has issued a draft report proposing revisions in how it develops cryptographic standards.
Distributed generation and plug-in motor vehicles are among the emerging security challenges to the smart grid. In an RSA 2014 preview, Gib Sorebo of Leidos discusses the threats to utilities and consumers.
Many endpoints in the healthcare sector, including medical devices, are being hacked because of inadequate security, according to a new study from the SANS Institute that identified apparent vulnerabilities at 375 organizations.
The cloud isn't just the most effective place to secure email, before any threats or intruders ever reach your network; it's also the most efficient. Cloud-based email services can offer full protection with the promise of availability and reliability too.
Read this white paper to learn about:
Securing email in...
The regulatory environment means that monitoring what information leaves your organization is as vital as protecting it from external attacks. Email is one of the most likely routes by which data may leak, maliciously or more often accidentally. A successful Data Leak Prevention system will address the issue of email...
According to industry analysts, email volume in organizations is growing by more than 30 percent annually, and the average user receives 7 MB of data per day via email. As a result of this growth, the handling of email has become a critical business, IT and regulatory issues - driving the need for email archiving...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.