Understanding the promise of user behavior analytics is one thing. Deploying them to detect and respond to threats is quite another. Bert Rankin, chief marketing officer of Fortscale, offers tips on practical application of the latest UBA solutions.
"The first obstacle is to begin to really rethink how the...
Due to the large volumes, ongoing generation, and varying long-term retention needs, the collection and analysis of logs and machine-generated data to support enterprise insight is often too demanding for manual processes. Log and machine data management
solutions provide capabilities intended to automate and...
The Obama administration's initiative to move much of the U.S. federal government's security clearance responsibilities to the Defense Department from the Office of Personnel Management is receiving mixed reviews from security experts and lawmakers.
As Microsoft pours huge investments into their cloud-based Office 365 offering and the business
case for migration to cloud-based services becomes more compelling, understanding the technical implications and business risks
of a migration is crucial for a smooth, safe transition. Those who are considering
a...
Email encryption should be easy.
Don't let the complexity and maintenance of a solution pose a barrier to getting
work done effectively. When users have too many hoops to jump through,
they may resort to insecure methods- putting your business at risk. There is a better way. Protecting your email, your clients and...
Healthcare organizations face an ongoing compliance burden involving the protection
of sensitive patient data. The task of safeguarding data grows increasingly complex as
the organization's environment adapts to advancing threats and shifting technology
trends. Once simply in record rooms and on desktops, now...
Securing sensitive emails isn't just a best practice - it's often the law. Compliance with
regulations is a priority for healthcare, financial services and government organizations; it may
also need to be a priority for companies that work with these organizations or practice business
in specific...
The Ukrainian energy sector is being targeted by fresh phishing attacks, the country's computer emergency response team warns. But it's not clear who's behind those campaigns, or a recent malware infection at Kiev's main airport.
Healthcare organizations need to carefully scrutinize the security of electronic health records and other applications they use because encryption and other features often have shortcomings, says Chris Wysopal, CISO at the security firm Veracode.
Extortion campaigns waged by cybercriminals are expected to become more damaging in 2016, putting additional pressure on CISOs to enhance protection of internal networks and educate employees about extortionists' techniques, says iSight Partner's John Miller.
Here's why the acquisition of rival threat-intelligence firm iSight Partners by breach investigation heavyweight FireEye makes sense, and why market watchers predict that other stand-alone intelligence firms will soon get snapped up.
Q2 2015 was dominated by attacks launched by DD4BC, the same malicious group responsible for several Bitcoin extortion campaigns in
2014. DD4BC expanded its extortion and DDoS campaigns during April and May 2015, where over the course of one week, several customers received ransom emails in which the group warned...
WordPress, with it's ever-growing popularity, is an attractive target for attackers. Many of its security issues come from third-party plugins and themes. Getting these listed on WordPress.org
requires approval and must adhere to a
strict list of guidelines. After this initial approval, however, future changes...
For virtualization security, there's no one size fits all solution...and trying to fit your organization's specific needs into the wrong security product can be a costly mistake. Do you know how to pick the right option for your organization?
Download this white paper to explore:
Different virtualization...
Choosing the right MSSP partner is an important decision in an organization's overall security. Writing an RFP is the first step in the process to finding the right fit for the organization. By using this document, an organization should be able to choose an MSSP and write a tailored RFP/RFI that will help make the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.