Data loss is a growing issue for companies around the globe. Everyone's on the go and intellectual property is equally as mobile. While the focus on leaks via removable drives and other media is admirable, the bulk of the problem lies in the tool everyone uses almost every moment of the day: email.
Download this...
Government agencies used to be the top attack target, as well as the top source of threat intelligence. How did the private sector turn the tables, and what can government do to improve? Rapid7's Wade Woolwine offers insight.
One of the biggest security gaps exposed by recent high-profile breaches? Government's...
If malware infections and data breaches are inevitable, then why should organizations even try to be proactive? Isn't a reactive stance more appropriate? Not so, says Marcin Kleczynski, CEO of Malwarebytes.
In an interview about proactive malware detection, Kleczynski discusses:
Why it's not enough to react to...
Today's banking institutions face significant business challenges related to and arising from informational silos and insufficient enterprise policies regarding information, all of which are exacerbated by the ever-increasing twin burdens of regulatory compliance and litigation.
Download this white paper to...
IT departments are struggling with exponential data growth from every corner of the enterprise. Even though it's generally understood that a huge portion of the data that enterprises are holding onto - an estimated 70 percent - is no longer of any business value, unanswered questions such as who owns it, what's...
In this age of rapidly expanding data and highly skilled threat actors, technological advancement presents the urgent duality of great opportunity and great risk. Your data is integral to both and a key asset that differentiates your organization. It's impractical to completely 'lock it down' and yet its open use can...
When it comes to healthcare payments, fraud tends to come in two flavors: Organized and opportunistic. What are the biggest gaps in detecting and preventing these schemes? IBM's Robert McGinley shares insight.
In an interview about fighting back against the newest healthcare payments fraud schemes, McGinley...
The motivation for individuals to sell their wares on Dark Web markets is primarily to sell items of questionable legality or out-right illegal items, with a high level of anonymity. Anything that can be obtained easily or with minimal risk, and then sold for profit is going to be a prime target for the Dark...
In August 2015 the Healthcare sector received a risk score equal to its six month average, indicating that the sector experienced the normal level of cyber risk for the month. As usual, most of the incidents that occurred during the month affected the Healthcare Facilities and Services group. It is not often that...
When it comes to cybercrime, the hospitality sector is like an eternal spring. Hotels, motels, casinos, resorts and spas, and their ancillary support businesses provide a seemingly endless stream of customers, transactions, and data. Hospitality businesses are by their very nature busy - if not they go under - and...
Special Operations Forces (SOF) from friendly countries use joint training exercises, such as Operation Nighthawk, to improve their own capabilities and to ensure that they can work together to counter cross-border and multi-national threats.
Operation Nighthawk was a 2014 multinational SOF training exercise,...
Sophisticated hackers, organized criminals, foreign governments and other adversaries motivated by financial gain, politics, and even twisted cravings for infamy are now working around-the-clock to attack valuable information assets inside nearly every U.S. government institution.
As traditional network perimeters...
The Federal Deposit Insurance Corporation (FDIC) classifies 70 million adults as either "unbanked" or "underbanked;" Javelin Strategy & Research estimates that "just over one-in-four Americans" fall into these categories. Regulatory bodies have made their expectations clear: They want more of these consumers given...
Financial crime schemes are increasing in frequency and sophistication. Organized crime syndicates attacking financial institutions and their customers are global, professional, and experts at monetizing stolen information. Criminals continue to blur the lines among cybercrimes, fraud and money laundering crimes -...
Healthcare executives continue to emphasize reducing risk exposure and related financial losses. These losses affect more than just the bottom line. The ability of an organization to control and protect its financial assets - especially from improper payments - also directly affects an organization's reputation and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.