"Show me your dashboard." That's a request security expert Gavin Millard regularly makes to CISOs to demonstrate how today's too-complex dashboards highlight the challenge of gathering and distilling essential security metrics.
Data security expert Kate Borten, a former CISO who's a featured speaker at the June 11 Healthcare Information Security Summit in Boston, warns healthcare organizations against overlooking key data protection steps.
Almost all business improvement initiatives can be augmented by a paper-free project, and as we will see in this report, the paybacks can be dramatic in terms of improved response times and greater productivity of back-office staff. Extending capture to mobile devices provides even closer coupling to back-office...
According to various industry articles and vendor marketing materials, most organizations are struggling with the problem of too much electronic data - how much of it there is, what it contains, who has access to it, where it is currently stored, and how long it should be kept. In other words, how to govern it more...
Not only are high-profile healthcare breaches driving home the need for improved security measures, but healthcare mandates are also urging providers and business associates to review their IT infrastructure and upgrade it to maintain compliance.
And 2015 is particularly taxing on the healthcare industry: Half of...
The Gartner Security and Risk Management Summit tackles digital business, a concept that blurs the physical and digital worlds, and requires organizations to reconsider how they approach IT security and risk management.
Healthcare organizations' disaster recovery plans typically don't include steps to deal with looting incidents. But the April riots in Baltimore serve as a reminder that unexpected violence can result in health data breaches.
Rather than taking specific steps to thwart potential cyber-attacks from nation-states, organizations should focus instead on implementing a comprehensive strategy to protect their sensitive data from all threats, says Lance James of Deloitte &Touche.
When it comes to advanced threat protection, security leaders increasingly turn to new machine learning solutions. Stephen Newman of Damballa discusses key skills and strategies necessary for success.
Mark Weatherford, a former DHS cybersecurity leader, says the Office of Personnel Management neglected to take basic steps that could have helped prevent a breach that may have exposed the PII of 4 million current and former government workers.
This survey examines the costs incurred by organizations after experiencing genuine data loss incidents
Download this informative infographic to learn:
What could a data breach cost you?
How does your industry compare to the cost of a data breach in other industries?
What actions can save you money?
While security attacks on big businesses dominate the headlines, midsized organizations are a highly attractive target for cyber criminals. Unlike large enterprises that have large IT departments with dedicated teams focused solely on security, midsized organizations must protect a growing amount of valuable...
To help protect against the latest advanced threats, many organizations have opted to augment their traditional perimeter defenses (firewalls and anti-virus tools) with point solutions focused on threat detection. But these point solutions often target a single threat vector, leaving the organization exposed to other...
The Office of Personnel Management is notifying 4 million current and former federal government employees that their personally identifiable information may have been exposed by a breach of its IT systems that the government discovered in April.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.