The Department of Health and Human Services is seeking comments on how it can improve its security risk assessment tool, which is designed to help smaller organizations conduct assessments as required under HIPAA. Some critics have said the tool is too difficult to use.
Five questions to evaluate and improve your device security posture in 2021
APTs and ransomware actors are increasingly leveraging firmware vulnerabilities to penetrate enterprise devices. To keep pace, you need to understand and address the risk to your organization.
This report from Eclypsium will help your team...
Networking device security is at the forefront of the modern-day enterprise. It and security teams are learning to navigate through an evolving landscape of networking equipment, connected devices, and personal-use employee devices in remote environments.
Recent studies estimate that up to 90% of enterprise devices...
A federal $25,000 HIPAA settlement with a clinical laboratory is significant because it calls for a wide-ranging corrective action plan. And the enforcement action is unusual because it's the result of a compliance review of a covered entity not directly tied to the data breach that triggered the investigation.
Discover the latest trends to see where risks are growing and how you can defend against them.
Results from the Verizon Mobile Security Index (MSI) 2021 report show that 62% of employees currently work remotely—that’s nearly double pre-pandemic numbers.
With remote workers accessing valuable corporate data...
To defend against cyberattacks, it's important to "demystify" cybersecurity and break it into risks that can be managed by any organization, says Ciaran Martin, the former director of the U.K. National Cyber Security Center.
By issuing a sweeping cybersecurity executive order on Wednesday, the Biden administration is attempting to take a critical step to address security issues that have come to light after recent cyberattacks. Here's an analysis of the order's key elements.
Vulnerabilities in the way you manage identities and credentials are easy targets for cyber attackers. Sophisticated bad actors know how to fully exploit them to steal your most valuable IP and data, disrupt your operations and destroy your reputation with customers.
This eBook presents five ways your teams can...
We live in a world where employees are almost twice as likely to expose corporate data than they were prior to the pandemic. As a result, organizations have been struggling to solve this problem with legacy solutions such as DLP and need a dedicated Insider Risk Program instead.
By attending this session, you...
The Biden administration will prioritize cybersecurity in its $1 billion IT modernization grant program for federal agencies, which will be overseen by the General Services Administration and the Office of Management and Budget.
A bipartisan group of lawmakers has introduced a legislative proposal that would create a program, similar to the National Guard, to deploy those with tech and security skills during significant cyberthreats, such as the recent SolarWinds and Microsoft Exchange attacks.
He’s been an Air Force general, a CEO and the first federal CISO. Now Gregory Touhill is taking charge as director of the Carnegie Mellon University Software Engineering Institute's CERT Division. And he’s bringing all his past experience to bear in a new effort to forge partnerships and protections.