Cyber security threats continue to proliferate and become more costly to businesses that suffer a data breach. When it comes to combating these growing risks, most organizations continue to place more trust in technology-based solutions than on training their employees to be more aware of the threat landscape and able...
Virtualization and microsegmentation are helping to better protect electronic medical records and other critical systems at Nebraska Medicine, says the health system's CIO, Brian Lancaster.
Helping victims know their passwords have been exposed in a data breach is half the battle in the fight to improve password security. To help, Mozilla and 1Password are integrating into their products a feature from the popular "Have I Been Pwned" breach notification service.
Attackers are using a wider range of more sophisticated methods to infiltrate vulnerable systems. And although news of external breaches often dominates headlines, organizations must also be able to defend against insider threats. Many organizations have built an entire ecosystem to look for suspicious external...
Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn't surprising.
Read this white paper to understand how the digital transformation journey requires thinking through a clear roadmap that spans multiple years, anticipating near- and long-term...
CA Privileged Access Manager protects an organization's business and empowers its people. The solution protects critical accounts and endpoints while providing a seamless user experience. CA commissioned Forrester Consulting to conduct a Total Economic Impact (TEI) study and objectively examine the potential return on...
Phishing remains the top attack vector, and an organization's people of course remain the top target. But how can these same people be leveraged as a key component in your anti-phishing defense? "Security professionals have to abandon any notion that phishing is solely a technology challenge", says Kurt Wescoe, Chief...
Dozens of the world's leading security vendors know the importance of a comprehensive file intelligence service for combating undetected malware in their company. When searching for a service, keep in mind the importance of more specialized APIs and feeds, a "goodware" list, and a high number of malware samples....
With the constantly evolving threat landscape and the growing spectrum of sophisticated threats, research confirms that firewalls are failing to deliver the protection that organizations need.
Despite the use of firewall technologies, infections persist unchecked and the lack of visibility has becoming a major...
In the wake of Equifax and other major breaches, and armed with all of the personally identifiable information that they will ever need and a keen sense of the security controls that modern organizations use, sophisticated fraudsters are finding success as never before. At the center of it all is a new fraud trend:...
To increase the effectiveness of security information and event management tools, while lowering the rate of false positives, organizations need to bring in more context about user behavior, says Derek Lin of Exabeam.
Leading the latest edition of the ISMG Security Report: A preview of next week's Fraud and Breach Summit in Chicago, which will feature keynoter Brett Johnson, a former cybercriminal who now advises organizations on fighting crime.
A health system's decision to reportedly suspend about a dozen employees for apparently snooping at health records related to the tragic death of a co-worker spotlights the many challenges involved with preventing and detecting insider breaches.
Just one click: That's all it takes for a victim to inadvertently grant attackers access to their email account via a third-party application. Here's how to spot signs of OAuth-related hacking and how to defend against it.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.