Retired Air Force Gen. Gregory Touhill, the very first U.S. federal CISO back in the Obama administration, says he's encouraged by the new U.S. National Cybersecurity Strategy. His top takeaway: the shift of cybersecurity responsibility from consumers to manufacturers of vulnerable products.
Tom Kellermann has never tempered his criticism of U.S. cybersecurity policies. But he is openly enthusiastic about the National Cybersecurity Strategy unveiled March 2. "I was blown away," Kellermann says about the Biden administration's new five-pillar policy. "Seriously, this is a true strategy."
Faster payment technology has been around for years, but fraud continues to dominate the conversation, says Reed Luhtanen of the U.S. Faster Payments Council. Luhtanen says all payment systems have a fraud problem, and firms will be able to curb faster payment fraud with more experience and data.
With signs pointing to a global economic downturn, cybersecurity organizations are already thinking about managing budgets and doing more than less. Four CISOs share a wide range of belt-tightening tips, from putting the squeeze on your vendors and suppliers to training and hiring from within.
With the U.S. COVID-19 public health emergency expected to end in May, the government is set to scrutinize telehealth providers for HIPAA violations. That’s why healthcare firms should review their telehealth platforms and vendors, says privacy attorney Adam Greene of Davis Wright Tremaine.
In the latest weekly update, John Kindervag, creator of zero trust and senior vice president of cybersecurity strategy at ON2IT, joins ISMG editors to discuss the top zero trust storylines of the year, the impact of ChatGPT on the cybersecurity industry and how to tackle MFA bypass attacks.
Watch this video to learn about tips for preparing for incident response, improving threat detection capabilities, and hardening your environment in order to make intrusions like these less likely.
According to the Forrester Wave issued in December 2022, the top challenge security analytics vendors face when bringing SIEM, SOAR and UEBA together is making it easy for customers to manage and maintain the offering, says Forrester analyst Allie Mellen.
The adoption of new technologies, multi-cloud architectures and multiple data storage sites has resulted in data residing in more places than ever before. That's why enterprises need a single pane of glass to know who's touching their data and why, says Imperva CEO Pam Murphy.
The false positive rate for detecting check fraud typically is very high because it's such an analog process. To detect fraudulent checks faster, banks need to pair their legacy detection capabilities with image analysis solutions, says Trace Fooshee, strategic adviser with Aite-Novarica Group.
Healthcare cybersecurity leaders often say they do a great job of onboarding new partners, but then they add that ongoing monitoring of the relationship falls short. Jon Moore of Clearwater talks about when and where to talk security with partners - and red flags to watch out for.
In the latest weekly update, ISMG editors discuss the ESXiArgs ransomware campaign that has snared 2,800 victims, the data breach reported in an SEC filing by a multistate hospital chain, and Check Point's building of SD-WAN capabilities that are integrated with the company's network security stack.
Forcepoint's new Security Service Edge offering allows clients to apply access, threat or data loss protection policies across all channels as soon as they're implemented. The firm long offered DLP, SD-WAN, SWG and CASB tools, but the lack of full integration made it tough to apply unified policies.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.