Some regard the security risks that follow the digital revolution as acceptable trade-offs, more cautious ones are left out in the cold. The digital revolution calls for us to stay open to opportunities, and remain alert for threats. Closing oneself off to something good because of latent threats is impractical. All...
PCI DSS compliance is a top concern for many organizations as there are significant effects on business operations, payment card transactions, organizational security and data protection.
Download this white paper to learn:
Exactly how wireless technology has made compliance with PCI DSS more...
Broad adoption of WiFi has created a complex wireless landscape with proliferating mobile devices and applications. It is no longer sufficient to treat all wireless users and applications alike. Threats from social media networks and mobile malware provide a compelling need to deploy and enforce granular WLAN security...
Healthcare providers are migrating from large, independent stand alone organizations into complex new ecosystems. Today Provider Organizations, affiliated physician groups, labs and others are involved in both the provisioning of care, and the collection of vast amounts of information from patients. Health Information...
Ponemon Institute has completed its fifth year studying the cost of cyber crime to businesses around the world. The 2014 Cost of Cyber Crime Study taps the collective experience of 257 organizations in seven countries. It shows that cyber crime and its associated cost to businesses continues to rise. But there is good...
The Target security breach and discovery of the "Heartbleed" vulnerability in web encryption software taught us some important lessons about enterprise security. Analyst Robin Layland applies those lessons to establish key requirements for next-generation firewalls (NGFW). Then HP's TJ Alldridge explains how HP...
Today's workforce is highly mobile. They don't just work on laptops, they also use smartphones, tablets and other devices, many of which they brought into the enterprise themselves. In addition, these workers don't stay put. While many work from the office, most access corporate networks and data from a variety of...
Businesses have relied on endpoint defenses like anti-virus software for protection against malware. But while endpoint defenses are necessary, the headlines show they are not sufficient. Rather than relying on endpoint security alone, Gartner recommends businesses balance their investment across all four phases of...
Technically savvy armed robbers who stole an encrypted laptop and smart phone from a physician who works at Brigham and Women's Hospital in Boston demanded that the doctor reveal the devices' passwords and encryption keys as well.
From an intrusion at the U.S. Postal Service to the NSA leaks by former contractor Edward Snowden, this infographic offers a look at the top data breaches affecting government agencies.
Staples has confirmed that its retail point-of-sale systems were compromised earlier this year by malware-wielding attackers. Learn what two card issuers say about fraud tied to the breach.
The hacking of the State Department's unclassified systems, revealed over the weekend, and a similar incident involving a White House network, unveiled last month, are linked, an official says.
Critical infrastructure industries vary in the sophistication of their digital defenses. But malware including Stuxnet and Flame, denial-of-service attacks on the financial industry, and other threats have made it clear that all sectors are targets.
This eBook looks at key dependencies among critical...
Security breaches in large enterprises make the headlines, but 55% of small and mid-size businesses have also experienced a data breach. This e-book examines the security challenges unique to mid-size companies and the steps you should take to protect your business.
Download this eBook to learn:
Why...
Whether you develop software in-house, outsource development, or customize large commercial applications, you open the door to cyber attacks if your software contains vulnerabilities hackers can exploit. This survey report by Gatepoint Research explores the extent to which IT organizations employ application security...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.