Learn why on-demand simulation-based cybersecurity training is essential for security teams in today's threat environment. This white paper defines the simulation-based training market, its training value, and its advantages to security leaders and security team members.
Download this whitepaper to learn about the...
When securing the remote workforce, it's important to be mindful of the human challenges - educating children, caring for elders and dealing with the barrage of COVID-19 news, says Microsoft's Diana Kelley, who shares insights on balancing cybersecurity and compassion.
The latest edition of the ISMG Security Report analyzes how and why Russia is spreading disinformation about the COVID-19 pandemic. Plus: the latest CCPA regulation updates; a CISO's tips on securely managing a remote workforce.
Using deception technologies can impose a cost on cybercriminals and help reduce dwell times and increase visibility, says Acalvio CEO Ram Varadarajan.
At RSA Conference 2020 in San Francisco, Information Security Media Group's editorial team conducted more than 130 video interviews with industry thought leaders. Here are the highlights.
Security teams and boards often speak to each other in very different languages - and like
any situation where there's no translator, communication gaps are in abundance.
Download this whitepaper to learn more about:
Why traditional metrics fall short of telling the security story
Which metrics have meaning for...
Learn how security team leaders can measure and improve cyber resilience and the skills of their cyber team by utilizing on-demand, simulation-based training combined with individual and blue team exercise-based assessments.
Download this whitepaper to learn more.
Traditional approaches to training cybersecurity team members have either been limited by scalability, lack of hands-on learning, or cost. A new generation of simulation-based cyber skill training platforms have entered the market, and they offer hands-on, real-world simulation in scalable SaaS models and offer...
A new generation of eLearning and simulation technologies are changing the way CISO's operationalize cybersecurity. Advanced training technologies are helping cybersecurity teams hire more effectively, hone the skills of their cyber pros, and build highly efficient incident response processes.
Download this...
Healthcare organizations now can take advantage of a new guide to best practices for cyber intelligence sharing - which could come in handy during the COVID-19 crisis, says Errol Weiss, chief security officer of the Health Information Sharing and Analysis Center.
The RSA cybersecurity conference once again this year gathered tens of thousands of individuals to network and attend keynotes and briefings on topics ranging from election security and genomics to privacy and cybercrime. Here are 20 visual highlights from this year's event.
Reducing security complexity remains one of the toughest challenges facing CISOs, driven by the non-stop increase in threats, says Jeff Reed senior vice president of product at Cisco Security Business. Creating a sustainable solution will require advances in vendor interoperability, as well as automation and...
Customers put their trust in companies to deliver on promises of security. The quickest way to lose customers is to betray that confidence, especially when it comes to their personal information.
Hackers understand that, too. They quickly adapt tools and techniques to disrupt that delicate balance. To truly...
Hackers and cybercriminals have reached a level of maturity and efficiency unsurpassed in the history of cyberwarfare, resulting in a dramatic increase in attack frequency, complexity and size.
Although these threats constitute a clear and present danger to organizations worldwide, knowledge is power. This Hacker's...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.