The outrage directed at Oracle Corp.'s security chief after a recent blog post in which she scolded third parties who scan the company's software looking for security flaws had a familiar ring: Do medical device makers have a similar cybersecurity attitude?
Most advanced attacks rely as much on exploiting human flaws as on exploiting system flaws. Proofpoint developed this report, The Human Factor, to explore this under-reported aspect of enterprise threats using data gathered from the Proofpoint Targeted Attack Protection product deployed in customer environments,...
In a security landscape where the frenetic pace of technology has changed paradigms in ways organizations are struggling to cope with, Blue Coat's Hugh Thompson advises adopting a 'Degrees of Freedom' approach.
Did Massachusetts' first registered medical marijuana dispensary break federal or state privacy regulations by accidentally sharing patients' email addresses? Experts explain that ... well, the answer is a little hazy.
After years of neglecting data security, the healthcare sector has only itself to blame for making itself an easy target for hackers, says David Kibbe, M.D., president and CEO of DirectTrust.
Mobility has quickly evolved from being a "project" to an enterprise platform. What are the key security and privacy considerations when managing enterprise mobility? Good Technology CTO Nicko van Someren shares insight.
How might federal authorities approach a forensics examination of Hillary Clinton's email server? ISMG asked four experts for their insights. Their observations - shared in this audio report - might surprise you.
Chapter 7 of Intelligent Cloud Data Protection says "With the vast majority of data breaches due to compromised user credentials, it is not enough to simply encrypt information. Access to encrypted data through the StratoKey gateway is constantly analyzed and profiled to detect a vast array of threats and...
In June 2012, restaurant chain Penn Station was among the first retailers hit by a POS breach linked to malware. Here, in an exclusive interview, President Craig Dunaway discusses the lasting impact of the breach.
When it comes to mobility, enterprises are not nearly as secure as their security leaders believe them to be.
Read this global survey of nearly 400 information security executives to learn why organizations are currently ill-prepared to:
Defend their critical data
Deploy security controls to evolve with...
A new report says the Department of Health and Human Services has several security weaknesses that may have contributed to five recent data breaches. But are other healthcare entities guilty of the same mistakes?
The conduit between user access and protected data is a known target. This is where the StratoKey countermeasure engine comes into play. The countermeasure engine is a rules based engine where administrators can set what essentially amount to firewall rules. These rules can be benign such as IP range specifications,...
In today's complex cyberthreat landscape, it's more important than ever to have the right security solution in place. Are you settling for partial protection?
Download this white paper, "Endpoint Security for Business: Technology in Action", to learn about:
Threats you can see and those you can't;
The...
You're at your desk, working to finish a project on a deadline when, all of a sudden, your screen freezes and a dialogue box pops up to tell you that your computer is locked and your files will all be destroyed if you don't pay up. Unfortunately, this is not the script for a crime drama. Since many victims are willing...
Cyberattacks can be the downfall of an organization's reputation. News headlines are filled with stories of major corporate data breaches across all industries.
To effectively navigate the increasingly sophisticated and complex threat landscape and keep your organization out of these kinds of news stories, you need...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.