Files may be secure within a network using perimeter-based solutions. They may even remain secure during transit using encryption technologies. But what happens once recipients obtain and decrypt those files? How do you keep information secure as the file gets passed around or downloaded onto a flash drive? How can...
Despite the frequency of healthcare data breaches, only half of U.S. hospitals have the infrastructure to support two-factor authentication, according to a new report. Plus, some information security leaders say implementation of the technology at many of those facilities is likely relatively narrow.
Today's cybercriminals are aware of the fraud prevention technologies deployed by most financial institutions, and they design attacks to circumvent these controls. Transaction anomaly detection and device ID approaches can be highly inaccurate, generating a large number of false positive alerts that can overwhelm IT...
Recent attacks have shown that once a user's endpoint is infected with advanced malware, criminals can bypass most security layers, including two-factor authentication, device ID systems, risk engines and behavioral analytic systems. Banking malware such as Citadel, Zeus, Dyre and Bugat, incorporate advanced...
At the core of every cyber-security strategy is identity and access management. Because so many security issues and audit failures are user-related, organizations need to make sure people have appropriate, up-to-date access entitlements and that their access activities are monitored wherever they are located. The...
This $2 billion manufacturer - with customers in the nuclear, defense, aerospace and power generation industries - chose Thycotic Secret Server to secure and manage their privileged account passwords across its global enterprise.
Download this case study to learn:
Why privileged account management is a major...
This free Privileged Password Security Policy Template gives you best-practice policies to help your organization improve IT security and demonstrate regulatory compliance. You'll save hours of effort leveraging these policies that are easily customizable in a matter of minutes.
Downloaded as an editable, easily...
In the wake of hacker attacks, which have left healthcare providers uncertain about what security steps to take, the Office of the National Coordinator for Health IT is working to help organizations sort out role-based identity and access management issues, says ONC's privacy officer, Lucia Savage.
An inspector general's memo that highlights three significant information security deficiencies that have plagued the U.S. Department of Labor for the past five years points out problems that most federal agencies confront.
Human resources departments can play an important role in helping to prevent insider breaches, says Reid Stephan, IT security director at St. Luke's Health System. In an interview, he describes his organization's strategy.
Misusing data access privileges can pose a threat to the integrity of an organization's IT systems and the privacy of individuals. But gray areas exist, and it's not always clear cut when "unofficially" accessing protected data means users are abusing their privileges.
The increasingly sophisticated cyberthreats facing healthcare are making privileged access management more critical, says Sudhakar Gummadi, CISO at Molina Healthcare, a managed care company.
Today's constantly evolving advanced malware and APTs can evade point-intime defenses to penetrate networks. Security professionals must evolve their strategy in lock-step to confront these advanced threats before, during and after attacks. NSS Labs recently cut through the noise surrounding advanced threats and the...
More and more companies today are finding themselves under a multitude of common and advanced malware attacks. As a security professional or IT manager, you are likely struggling to effectively identify attacks, let alone prioritize the most dangerous ones that should be addressed first.
With the Cisco® Advanced...
It is not too far when most enterprises will experience doomsday scenarios, as cyber threats are only increasing faster than the ability to implement security improvements. One cannot deny the fact that even those organizations employing good cyber practices are being penetrated, as hackers are getting more...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.