In what may be a case of industrial espionage, Massachusetts-based drug development company Charles River Laboratories has reported a cyberattack involving the copying of client data by an intruder. Why is IP theft a growing worry for the healthcare sector?
New exploits released online that target long-known configuration weaknesses in SAP's NetWeaver platform could pose risks to payroll, invoicing and manufacturing processes, according to researchers at Onapsis. As many as 50,000 companies could be vulnerable.
Hiring and keeping good IT/security practitioners can be tough, so once you've got good talent you'll need to work to keep them.
Download this eBook and learn ways to keep your security analysts happy by:
Getting your security tools in order;
Building a feedback loop to stop false positives;
Setting a tone for...
Understanding the true costs of building and operating a security operations center has more to do with the capability you'd like to field than the people you need to hire to run it 24x7.
Download this eBook and learn:
The different levels of SOC capabilities;
How to determine which level is right for your...
The Microsoft Vulnerabilities Report 2019 analyzes the data from security bullitens issued by Microsoft throughout 2018. On the second Tuesday of every month, or "Patch Tuesday," Microsoft releases fixes for any vulnerabilities affecting Microsoft products. This report compiles these releases into one, holistic...
Vipin Surelia, Senior Director-Risk Services, Visa leads the India and South Asia team that ensures the safety and security of the VISA network, as well as internal and external products and services, including business continuity.
In this exclusive Summit appearance, Surelia will sit for a "fireside chat"...
Federal regulators and medical device maker Philips have issued alerts about a security vulnerability in the company's Tasy electronic medical records system that could put patient data at risk. How common is this type of vulnerability?
The U.S. Department of Homeland Security is requiring that federal agencies speed up patching and remediating "critical" and "high" software vulnerabilities. Security experts say this change is long overdue. But does it go far enough?
This report is based on a Forbes Insights and IBM survey of 353 executives across the globe, which reveals a significant disconnect between how executives view resilience and responsibility when it comes to the gray areas of their expanding technology ecosystems.
Download the report and learn why:
Only 42% of...
Third-party breaches remain a dominant security challenge for organizations, with over 63% of breaches linked to a third party. Clearly, both organizations and their third parties are wasting critical financial and human resources on programs that aren't optimized to help them reduce cyber risk in their shared...
Insider threat and email attack risks are a major issue in the health industry, 95% of IT executives have identified insider threats as a top concern in last 12 months, 79% think employees have put data at risk accidentally and 61% say employees have done so maliciously.
In this session will look at how...
Vodafone is disputing a Bloomberg report that security vulnerabilities and backdoors within Huawei networking equipment could have allowed unauthorized access to its fixed-line carrier network in Italy. The report comes as Huawei continues to face concerns over its engineering practices and government ties.
What are the key privacy and security requirements proposed in the latest draft of the Trusted Exchange Framework and Common Agreement issued by federal regulators to promote nationwide secure health data exchange? Elise Sweeney Anthony of the Office of the National Coordinator for Health IT explains.
An unsecured database hosted on Microsoft's cloud platform contained personal information on nearly 80 million U.S. households, according to two researchers who found it. What does Microsoft have to say about the mysterious database?