Most cloud security discussions have focused on what cloud providers can do, what they can't do and what they might do if you pay them enough. These discussions focus on topics such as virtualization, hosting and data storage. However, just as the software industry has learned that putting fancy boxes on the
network...
The prevalent approach to security management and operations is to implement on an ad hoc and technology-focused basis. This haphazard approach is no longer adequate.
This report details:
The current state of the market and what to expect moving forward;
Research implications for technology vendors;
Research...
As part of the software development process, security professionals must make choices about where to invest their budget and staff resources to ensure that homegrown applications are as secure as possible.
This research brief details:
Best practices for all organizations that would like to produce more secure...
The fact is that the world is constantly evolving and always connected - and your enterprise must be too. Forward-thinking enterprises realize that they need to focus on a sustainable approach to security and risk management - one that is designed to address the new wave of vulnerabilities that prevail due to...
Every enterprise has high-value information that is vital to its success. As cyber-attack techniques become more sophisticated your "digital gold" is increasingly vulnerable. Today's cyber threats have changed in sophistication, in focus, and in their potential impact on your business.
Download this eBook to...
DDoS attacks on banks are becoming more rampant, advanced and persistent. Attackers are continuing to work around the clock in developing and sharpening their toolset and methodologies used to perform these attacks.
Most attacks have been brute-force against multiple institutions; others have been subtle, probing...
From sophisticated new forms of malware to nation-state sponsored attacks and the advanced persistent threat (APT), cybersecurity incidents have evolved at a rapid pace and are disrupting business continuity. But are organizations' incident response programs, personnel and tools evolving to keep up with the new threat...
In recent years, enterprises and government agencies have fallen prey to a myriad of successful cyber attacks of unprecedented sophistication and reach. Despite spending over $20 billion annually on traditional security defenses, organizations find themselves battling a new generation of cyber attacks, such as...
In the last few years, the scale and sophistication of IT security threats have grown at an explosive rate. Organizations have to contend with industrialized attacks, which, in some cases, rival the size and sophistication of the largest legitimate computing efforts. In addition, they also have to guard against a more...
Is your status among C-level colleagues slipping? Are your budgetary pitches falling flat?
If you've answered "yes" to either of these questions, Forrester Research, Inc.'s February 2012 report, Navigate the Future of the Security Organization can help you:
Stop reacting to a never-ending series of threats du...
For the first time, Ponemon Institute has quantified the staggering costs of failures in cryptographic key and digital certificate management.
The First Annual Cost of Failed Trust Report, underwritten by Venafi, reveals findings such as:
Hundreds of millions lost due to failure to control trust;
Serious...
Data breaches are more likely to come from inside your walls than outside. Without a way to manage user access, a privileged user can endanger your system at length before you discover it. To protect against that risk - and the chance of failing a PCI or SOX audit - you need to ensure privileged users can't abuse...
To mitigate the top threats for 2013, organizations need to understand the motivations of potential attackers so they can adequately defend their networks and systems.
What are the top security threats, and how are organizations responding to them?
"Reassessing Risk" is the cover story of this 2013 edition of...
Criminals, hacktivists and hostile governments understand that the quickest way to corporate data is through mobile workers' unsecured endpoints.
Cyber criminals targeted mobile devices at unprecedented rates in 2012, exploiting the weakest link in the corporate network to steal enterprise information. For the first...
Between 2009 and early 2012, more than 18 million patients' Protected Health Information (PHI) was compromised. Over the past year alone, healthcare breaches in the U.S. are up 32 percent. As these numbers demonstrate, securing PHI is one of the most pressing issues facing hospitals and other healthcare organizations....
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.