Hackers know people are the weakest links in an information security program and have refined the art of social engineering accordingly. One method in which the hackers prey on their victims is through phishing which utilizes electronic communication that appears to be trustworthy to obtain sensitive information. ...
In Forrester's 82-criteria evaluation of application security vendors, we identified the 12 most significant service providers in the category - Beyond Security, Checkmarx, Contrast Security, Coverity, HP Fortify, IBM, Qualys, Quotium, Trend Micro, Veracode, Virtual Forge, and WhiteHat Security - and researched,...
Around the world, organizations are overcoming their security concerns and are taking the leap to cloud computing in order to realize capital expenditure cost savings and leverage a pool of specially trained security monitoring resources.
Download this white paper to explore:
More than a trend, cloud-hosted...
Security Information and Event Management (SIEM) systems cause a lot of controversy among security folks. They are a cornerstone of every enterprise security program but SIEM continues to generate many complaints and elicit considerable angst among security professionals.
Download this white paper to...
The network intrusion prevention system (IPS) appliance market is composed of stand-alone appliances that inspect all network traffic that has passed through frontline security devices, such as firewalls, secure Web gateways and secure email gateways.
Download this report to learn about the network IPS market and...
The wildfire growth of mobile apps has added to the security challenges of financial institutions that provide this highly in-demand method of account access. The risks are substantial but there is a way to reduce exposure while enhancing customer convenience.
Download this white paper to explore
The...
In the last few years, financial institutions faced the steep challenge of balancing customer convenience with security in their mobile banking apps. As their popularity has grown, banks have heard the call and learned that apps provide great value and boost customer loyalty, but banks still face the difficult task...
As the idea of comprehensive Enterprise Mobility Management (EMM) has taken shape, organizations are increasingly enabling the kind of true mobility their employees
have been clamoring for - and apps are a driving force. For businesses, the ability to make this sort of mobility a reality for users has a lot to do...
Social media and web enabled technology has changed public safety and policing in Canada. Internet enabled radicalization has caused a few Canadians to commit acts of domestic terrorism. Canadian youth are increasingly being victimized by cyber-bullying and all Canadians are more at risk of falling victim to...
How Healthcare Organizations Manage Mobility and Compliance
Operating in a regulated industry, like healthcare, adds a layer of complexity to many things - including mobility.
While enterprises in other industries may be concerned about security - health-related organizations and their business associates are...
Taking care of business in the 21st century means tapping into the collective creativity of employees. Equipping the modern workforce with conferencing, communications and other collaboration software and services is driving businesses of all sizes to reach new levels of productivity.
But why should teamwork take a...
Until recently, every second story in enterprise IT news seemed to be about the 'Bring Your Own Device' (BYOD) phenomenon and its ever-increasing stronghold on the enterprise world. And indeed, recent research suggests that roughly 60% of global businesses may have implemented some form of BYOD already.
Download...
A mobile computing policy document (sometimes called an Acceptable Use Policy) tells employees what's expected of them when it comes to using smartphones,
tablets and other mobile devices for work. It marks out the responsibilities of the company as well.
Mobile device users need rules and guidelines to understand...
CIOs make tough decisions every day. To make the right ones, you have to trust your sources and be confident that you're prioritizing the right issues.
Enterprise Mobility Management (EMM) is top of mind for most CIOs today, not just because of BYOD and COPE (Corporate Owned, Personally Enabled), but also because f...
Against an unrelenting drumbeat of increasingly sophisticated security and fraud attacks, most organizations now understand that a professional, efficient response to a data breach is the difference between a customer uprising and an opportunity to quickly reestablish trust. However, every minute matters and every...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.