Because the healthcare sector is a growing target for cybercriminals, organizations must implement security practices that look beyond HIPAA compliance and also address business associate risks, says risk management expert Kenneth Peterson.
"Cybercrime as a Service" is the latest threat evolution, and traditional defenses continue to fall short. Derek Manky of Fortinet discusses the merits of information sharing and the new Cyber Threat Alliance.
Distributed-denial-of-service attacks, fueled by the interconnected nature of smart devices, will only continue to increase, says Matt Moynahan, president of Arbor Networks. "The infrastructure itself is insecure," he says.
Nobody wants to be a cyber-attacker's first victim. But there are benefits to being second or third, says Akamai's Mike Smith. Then you get to enjoy the true benefits of the oft-discussed information sharing.
Amidst a global information security staffing crisis, India must focus on developing more practitioners with deep technical skills. This is the practical advice from Hord Tipton, out-going director of (ISC)Â².
While the FBI blames North Korea for the hack attack against Sony Pictures, security expert Carl Herberger says the attack differs from previous nation-state attacks. Learn how organizations must shift defenses.
Richard Spurr has been CEO of security vendor ZixCorp for more than 10 years. How has his approach to e-mail security evolved, and how does he see evolving threats and the marketplace changing in the year ahead?
As CEO of ForeScout Technologies, which focuses on continuous monitoring of networks, T. Kent Elliott says he has to anticipate the next generation of vulnerabilities. So what's the most significant emerging risk? The Internet of Things.
When you're thinking about securing your data assets and web site, how do you really know the value of what you're protecting? Akamai's Terrence O'Connor shares how to determine the cost of a data breach.
Lost and stolen mobile devices might be a leading cause of data breaches. But it's a strategic mistake for enterprises to focus too heavily on device security, says Christy Wyatt, CEO of Good Technology.
Following a "Flash Alert" from the FBI, organizations must mitigate the risk posed by dangerous "wiper" malware attacks designed to erase hard drives. Malware expert Roel Schouwenberg offers strategic advice.
Retailers say tokenization and encryption are critical to ensuring payment card data security. Aite's Natalie Reinelt describes how merchants will use layers of security to protect data at the point of capture.
The use of big data for real-time threat analysis will become more commonplace among banks and credit unions in 2015, says Bill Stewart of Booz Allen Hamilton, who describes cybersecurity trends for the year ahead.