Healthcare organizations need to improve the methods they use to objectively assess the severity of a security incident and whether it should be reported, says David Parks, a privacy officer and attorney.
Increasingly, digital forensics is an important element of an information security program for organizations of all types and sizes.
But where can security leaders find qualified forensics professionals? How can these professionals obtain the skills and expertise they need to be successful?
Rob Lee of Mandiant...
Information security requirements and challenges change on a daily basis - and with them come growing opportunities for individuals with skills in digital forensics.
Rob Lee, a director with Mandiant and curriculum lead for digital forensic training at SANS Institute, discusses:
the growing need for digital...
Interview with Dr. David Dampier on Mississippi State's Unique Program
Mississippi State University's 'Wounded Warriors' program is all about providing digital forensics training for soldiers and sailors transitioning home from Iraq, Afghanistan and elsewhere in the world.
In an exclusive interview, Dr. David...
With the heightened focus on cybersecurity - and increased incidents of insider crimes - the digital forensics practice has also gained a higher profile in both the private and public sectors.
Keith Barger, a forensics veteran, currently serves as a director in KPMG's forensics practice in Houston, TX. In an...
Every organization is concerned about malware - how it evolves, slips past multilayered defenses and infects networks. John Nielsen, Product Manager for IBM Mobile Security, discusses the latest malware trends and steps organizations may take to fight back.
If you look at recent breaches, you see a common thread: If privileged identities were better managed, breach impacts would greatly lessen. Bill Mann of Centrify discusses the essentials of privileged ID management.
Brent discusses deploying multi-factor authentication to mega-enterprises with millions of end-users, knowledge-based authentication user enrollment, and how educational institutions are utilizing multi-factor authentication solutions.