ISMG and Zscaler hosted a roundtable dinner in Denver focused on security's role in digital transformation. Cultural and leadership challenges were major themes of this discussion, and Bil Harmer, Americas CISO with Zscaler, discusses his takeaways in this exclusive eBook transcript.
Bil has been in Information...
With the explosion of poorly secured IoT devices being regularly herded into larger and larger botnets, it's hardly a surprise that DDoS attacks are now so common and damaging. What is surprising, is that many companies still lack adequate protection against these attacks, especially in an era when Internet...
FBI agents say the government shutdown is impeding their investigations, including cybersecurity probes, with the lack of funding compromising their ability to pay confidential informants and obtain warrants or subpoenas.
With major data breaches in the news and high-stakes security regulations in effect - including GDPR and the NIS Directive - CISOs worldwide are scrambling to comply with IT standards and avoid hefty fines. Privileged Access Management (PAM) streamlines compliance and overlaps with the requirements of many...
Protecting the Department of Health and Human Services' systems, data - and program beneficiaries - from evolving cyberthreats is a top challenge for the agency, according to a new report that recommends action items.
As attackers increasingly take advantage of users' risky behavior, enterprise security leaders are taking steps to improve end-user security education. Gretel Egan of Wombat Security outlines how to focus on education strategies that are truly effective.
Applications run the world. From sophisticated e-commerce engines to personal tools on mobile phones, applications power how things get done.
Safeguarding them is key to ensuring the digital experience. Radware surveyed 300+ senior executives and IT professionals from around the globe for their insights into these...
Over the last five years, cybercrime occurrences have escalated dramatically, taking hold of organizations
worldwide - affecting revenue, productivity, information security, and reputation. In 2017 Cost of
Cybercrime Study, the Ponemon Institute emphasizes that, on average, organizations have paid
$11.7 million USD...
The modern enterprise is relentlessly challenged by the number of insider-related variables and risk factors when building an enterprise security defense. Even with an established program, factors like technological innovation, shifting business priorities and public discourse can quickly force the need to re-examine...
After an initial effort got off to a rocky start, the Department of Health and Human Services has started over, making a second attempt at launching a cyber coordination center that aims to help the healthcare sector improve its defenses and boost information sharing. Will the latest effort prove successful?
Despite the harsh reality that card not present (CNP) fraud is a serious problem that which is only getting bigger as the eCommerce market continues to grow, senior management is not giving this issue the attention that it deserves.
Some executives fail to recognize the correlation between fraud management and the...
A coding error in a portal of the Employee Retirement System of Texas inadvertently allowed some users to view the information of others, potentially exposing information on 1.25 million of its members. Why are breaches involving coding mishaps so common?
At RSA Conference 2018 Asia Pacific & Japan, Information Security Media Group conducted dozens of video interviews with industry thought leaders. Here are the highlights.
Those of you who are CISOs and have been conducting awareness programs for years realize that ''the devil is in the details" when building a successful program. Initial attempts to get an awareness program started are usually done by trial and error- but this hit-and-miss approach is often ineffective or frustrating....
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.