Unified Communications as a Service (UCaaS) from Windstream is a robust, sophisticated solution on a single unified platform hosted in an enterprise-class data center and accessible through the cloud. With a customized UCaaS solution that provides greater data security, we manage your communications needs and...
The White House, fearing China is spying on phone calls, has suggested that the U.S. government take a primary role in marshaling the development of secure 5G networks. But would nationalizing 5G networks make them more secure?
An assessment on whether North Korea is behind the WannaCry ransomware attacks leads the latest edition of the ISMG Security Report. Also, the co-author of NIST's revised Trustworthy Email special publication discusses changes in the guidance.
The healthcare industry (hospitals in particular) is one of the top industries targeted for cybercrime. Given the high value of a stolen healthcare record, motivated adversaries will continue to go where the money is.
Download this guide and learn:
The three most common DLP use cases in healthcare systems;
The HITRUST Cyber Threat Xchange played a role in making U.S. healthcare organizations aware of the worldwide WannaCry ransomware campaign early enough to help them thwart the threat, says HITRUST's Elie Nasrallah.
Email, which is too easily spoofed, phished or taken over, remains a leading cybersecurity risk. But finally, after years of pushing, the Domain-based Message Authentication, Reporting and Conformance standard, or DMARC is helping to bolster email security, says Phil Reitinger, CEO of the Global Cyber Alliance.
Adoption of the Domain-based Message Authentication, Reporting & Conformance - or DMARC - standard is very low in the healthcare sector, and broader use could greatly reduce phishing risks, according to a new study.
The global cybersecurity skills shortage is real, and it's deeply impacting organizations' abilities to implement and manage new technology tools. But worse, it's also affecting how organizations assess their adversaries.
What does the security team need to do? What requires protecting in the business? Where is it,...
Careful cyber security incident response planning provides a formal, coordinated approach for responding to security incidents affecting information assets. This e-book provides easy-to-follow steps for crafting an incident response plan in the event of cyber security attacks.
Download this eBook and you will learn...
Your security team should proactively and regularly hunt for cyber threats in order to stay on top of the ever evolving cyber threat landscape. If you are a CISO, information security manager, or security analyst, this eBook is a practical guide to help you understand how to set up your own threat hunting...
The latest ISMG Security Reports leads with a top DHS cybersecurity leader, Jeanette Manfra, providing a case study on how information sharing helped mitigate the WannaCry attack in the U.S. Also, the SEC mulls toughening its cyber risk reporting requirements.
In the past decade, financial institutions have undergone a significant digital transformation - delivering new levels of customer convenience and services through online and mobile channels. However, this represents just the beginning of an even greater change.
Read this white paper to learn more about...
Modern enterprises are doing their best to address three simultaneous and closely interrelated objectives related to their information technology infrastructure: to be secure, compliant, and well-managed.
Download this whitepaper and learn about creating:
Integration of data relevant to security, compliance, and...
Former Trump campaign aide George Papadopoulos learned that Russia had thousands of pilfered emails containing "dirt" on Hillary Clinton three months before they appeared online, according to court documents.
An in-depth look at the DMARC anti-spoofing system - which the U.S. Department of Homeland Security this past week said it will require federal agencies to adopt - leads the latest edition of the ISMG Security Report. Also, continuous monitoring of the insider threat.