New cybersecurity requirements for organizations regulated by the New York State Department of Financial Services (NYDFS) went into effect March 1, 2017. The new regulation will be felt far beyond the state of New York and will likely become the baseline standard for the financial services industry.
Download this...
It's no secret that Unified Communications (UC) breaks down the barriers to collaboration. Tools like instant messaging, presence management, mobility solutions, web and video conferencing, desktop sharing and unified messaging have been proven to open the doors to business-transforming productivity and...
The formula for achieving business success in today's always-on, always-evolving business environment begins and ends with innovation. It's a prerequisite for staying ahead of the competition and customer needs.
Likewise, constantly evolving your business model to align with customer buying behavior is the new...
An information technology juggernaut has left the station, gathering tremendous momentum as it rolls toward virtually every midsize and large organization. No, it's not the Internet of Things, software containers or even big data. It's the software-defined wide-area network (SD-WAN), a groundbreaking technology many...
The top 10 vulnerabilities typically account for 85% of successful exploit traffic. But complex, manual processes and disparate, disconnected tools make it difficult for security and IT teams to come together to respond to vulnerabilities before they lead to problems.
Join Jeff Battaglino from Seton Hall University...
Federal regulators have slapped Memorial Hermann Health System with a $2.4 million HIPAA settlement stemming from the disclosure of one patient's information to the news media without the individual's consent. Why was the penalty so high?
Hot sessions at this week's OWASP AppSec Europe 2017 conference in Belfast, Northern Ireland, cover everything from the EU's General Data Protection Regulation and fostering better SecDevOps uptake, to quantum-computing resistant crypto and ransomware economics.
Automation enabled by network virtualization will enable your enterprise to meet the demands of today's business environment. Read this tech brief to discover how your business can implement network automation and achieve the agility and speed required to compete in today's marketplace.
Enable networking and...
Business obligations require you to deliver more applications and services at a faster pace than ever before, all without making concessions on security, and without the budget flexibility to make significant investments. To overcome these challenges, which are even more complex with manual provisioning and...
Hardware-centric networks are not able to keep up with the demands of business today, not to mention the growing security threats that exist. Read this solution overview to discover how implementing a network virtualization solution for your business will make your life easier.
Enable networking and security at the...
A recent patient portal security mishap at a Texas-based cancer testing laboratory is the latest reminder of the need to safeguard sensitive health information on web-based applications and websites.
Who in the world could have attempted to mess with this past weekend's presidential election in France via a well-timed dump of campaign documents and communications from the campaign of Emmanuel Macron? Security experts say all evidence points to the usual suspect: Russian hackers.
Not so many years ago, Michael Donaldson was managing a major application for a large enterprise, and when he learned of an unpatched vulnerability, it took him two days to investigate and confirm. With the right tools today, that would take two hours. Listen and learn how.
An examination of the maturing of cybercrime leads the latest edition of the ISMG Security Report. Also, understanding the Intel Active Management Technology flaw.
Reporting software vulnerabilities can be legally dicey, particularly if the affected company has not previously had contact with computer security researchers. A Sydney consultant recently experienced both ends of the spectrum while investigating building management software.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.