CISA is warning that local K-12 school districts are increasingly under assault by cyberthreats targeting vulnerable networks that are disrupting physical and virtual education throughout the U.S. The top security problems include ransomware, Trojans and other malware as well as DDoS attacks.
The latest edition of the ISMG Security Report features an analysis of why the FireEye breach is a wake-up call for the cybersecurity industry. Also featured: Monero cryptocurrency scams; key considerations for cloud security.
The attack surface is expanding and adversaries are more sophisticated. Complexity is mounting and the pace is relentless.
As a security leader, it can be hard to know where to focus first.
Yet in the midst of this threat landscape overload, one challenge presents a greater risk than any other. And more often...
Government leaders are increasingly calling on cybersecurity researchers to better inform policymakers and are urging businesses to pay more attention to their in-house security teams, according to presenters at this week's Black Hat Europe virtual conference.
Security education for employees is worthless unless it's highly targeted, says Angela Sasse, a professor of human-centered security at Ruhr University Bochum in Germany, who offers tips.
This webinar with Osterman Research offers insights into critical issues network managers need to address to gain visibility and secure their network traffic.
Network Detection and Response (NDR) solutions provide the necessary visibility not available in SIEM or EDR solutions. Watch this webinar to complete your security architecture.
Encryption keeps the internet secure, but it also gives bad actors the perfect hiding place. Join Gigamon and ISC2 for a deep dive into the latest encryption protocol, TLS 1.3, to learn what's different and what advantages it offers in the constant effort to stay one step ahead of threats.
Cybersecurity leaders are not immune to the forces of digital transformation. In fact, Nicolas Casimir, CISO EMEA with Zscaler, says the role is forever changed by the business and technologies evolutions we have seen in 2020.
President-elect Joe Biden on Monday announced that two former Obama-era officials are his nominees to head the U.S. Department of Homeland Security and the Office of Director of National Intelligence.
Boeing CISO Howard Whyte started his job just as the world shut down to COVID-19. Since then, he's secured the workforce, ensured resiliency, grown his team and got to know peers, partners and board members - all from quarantine. In this exclusive keynote, he discusses:
Responding to 2020's challenges
Concerns...
Identity is the new perimeter, cloud is the new environment. What are the threats to watch and technologies to embrace? Join this panel of leaders as they discuss:
The new threat landscape
Identity, cloud, endpoint security and other key priorities for 2021
Leadership demands for the new hybrid workforce
Twitter has hired network security expert Peiter Zatko to serve in the newly created position of head of security following a series of high-profile cyber incidents. Zatko, known as "Mudge," gained fame as a member of the ethical hacking group "Cult of the Dead Cow" and worked for the government and Google.
Information Security Media Group's members-only CyberEdBoard CISO community has opened its doors, giving senior cybersecurity practitioners a private ecosystem to exchange intelligence, gain access to critical resources and enhance personal career capabilities in collaboration with peers around the world.
President-elect Joe Biden's approach to cybersecurity will likely mirror that of his old boss, former President Barack Obama. Expect Biden's White House to increase pressure on Russia, practice greater involvement in cybersecurity and return to higher levels of coordination than President Trump demanded.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.