In addition to providing training, healthcare organizations should consider implementing technology to help prevent user mistakes that can lead to breaches of protected health information, says Geoffrey Bibby of ZixCorp.
Christophe Birkeland, CTO of malware analysis for Blue Coat Systems, was part of the team that discovered the Russia-targeting Inception campaign, and says the hunt for new APT attacks remains ongoing.
EdgeWave's Mike Walls, a former bomber pilot who led Navy red teams, says penetration testing is useful in analyzing bits and bytes but not the readiness of operations under attack from cyberspace. Red teams, he says, can analyze the impact on operations.
Keeping track of missing devices is a critical aspect of information security. Ali Solehdin, senior product manager at Absolute Software, discusses Computrace, which helps organizations secure endpoints and the sensitive data those devices contain.
Wary of intrusions, data compromise and theft, organizations increasingly are deploying privileged access management solutions. Idan Shoham of Hitachi ID Systems offers the essential do's and don'ts.
Nationwide is a leading provider of insurance and financial services, with over 40,000 employees. With their employees clamoring for a robust BYOD policy, the insurer was focused on finding a mobile content solution that allowed for rapid adoption, enhanced security, and integrated with key productivity applications....
One of the leading cancer centers in the world, the University of Texas MD Anderson Cancer Center manages over 30,000 hospital admissions and 1.5m outpatient visits a year. Read this detailed case study to learn why Box was chosen as their end-to-end solution for secure file sharing to collaborate on research and...
Encrypted browsing - using HTTPS - helps secure online communications, and Apple says developers must now employ the protocol by default. Likewise, the White House says that by 2017, all federal websites must adopt HTTPS-only policies.
Too few security systems interoperate, which makes it difficult for organizations to block or detect data breaches. But Cisco has an interoperability plan to improve the state of cybersecurity defenses, Chief Security Architect Martin Roesch says.
Financial services institutions and insurance firms are facing the pressure of moving to the cloud due to cost savings and customer and employee demands alike. But IT departments are still hesitant to adopt cloud solution for fear or cyber-security threats, regulatory and compliance risks and a lack of control. This...
Known as the analytics software company that works with the top banks, FICO struggled to easily share information both internally and externally, with employees were turning to unsanctioned solutions. Now with Box, FICO can securely and simply collaborate in a mobile environment, increasing security and governance...
Kaspersky Lab has discovered a new, advanced persistent threat - inside its own networks. Dubbed Duqu 2.0, the malware has ties to Stuxnet, and was used to target Iranian nuclear negotiations, researchers say.
If you look at recent breaches, you see a common thread: If privileged identities were better managed, breach impacts would greatly lessen. Bill Mann of Centrify discusses the essentials of privileged ID management.
Gartner's Claudio Neiva says there is only so much an intrusion detection and prevention system can do, so organizations need to take additional steps to safeguard critical data and systems.
For Symantec, the investigation into the Duqu 2 began May 29, when Kaspersky Lab shared samples of the espionage malware - which is based on Flame and Stuxnet - and asked the security researchers to help verify its findings.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.