As part of a sweeping plan to "modernize" Medicare, federal regulators are also proposing to expand reimbursements for telehealth services. But what are the potential privacy and security concerns that healthcare providers need to address if they offer more telehealth services for patients?
Behavioral analytics have taken the fast lane from emerging tech to mature practice.
The key element that has made behavioral analytics move so fast and become something so important to security is that the focus has been not on the technology itself but on the value it provides the enterprise, notably when being...
Look at information security through the lens of business risk, and you'll begin to make decisions about security in light of their impact on the business.
With security threats emerging faster than ever, what if your most important information is not protected? What strategic business advantage do you gain if it is...
As businesses change their key strategies, they must ensure they mitigate new risks that emerge, says Chris Testa of Cybereason. This must go beyond a defense-in-depth approach to include a plan for what to do when an inevitable intrusion occurs, he says.
To build out the business structure and technical functionality that enables your organization to deliver products and services quickly and efficiently, you have to know how you're doing compared to how your competitors and peers are doing.
In other words, CIOs today must be highly effective at...
Without fostering feelings of responsibility and accountability for cybersecurity among employees, security awareness training won't necessarily make an organization any safer or less vulnerable.
Download this eBook and learn:
Why current awareness practices don't work;
The value of evidence-based awareness;
Big data and artificial intelligence have sparked a paradigm shift in risk management. From cybersecurity to PR to logistics, continuous monitoring is already making a major impact.
Download this eBook and learn how continuous monitoring technologies are transforming a range of risk areas such as:
How can security ratings help you identify, quantify, and mitigate cyber risk? Smart benchmarking requires objective, verifiable and actionable metrics on security performance.
Download this eBook and learn how:
To create a framework for effective cybersecurity benchmarking;
Security ratings can be used to...
A Shift Toward a Human-Centric Approach to Information Security
Every IT security department's job, to protect data, has become more challenging as the security perimeter has dissolved with the adoption of cloud applications. The traditional threat-centric approach is to apply rigid policies to a dynamic...
Stolen data is one thing - the consequences are obvious. But what if data is not stolen or leaked, but rather altered? What could be the damage? Diana Kelley of Microsoft discusses the emerging topic of data integrity and how to preserve it.
A new initiative by the Cyber Readiness Institute aims to promote best cybersecurity and vendor risk management practices to smaller enterprises. RiskRecon founder and CEO Kelly White offers his perspective on converting standards to practices.
An Equifax software engineer has settled an insider trading charge with the U.S. Securities and Exchange Commission after he allegedly earned $77,000 after he made a securities transaction based on his suspicion that the credit bureau had suffered a data breach.
Adoption of cloud services, SAAS Applications and mobile workforce are putting increasing strain on the corporate networks. This is exacerbated as organizations look to better connect their remote and branch office employees and offer them higher quality network services. Enterprises are turning to SD-WAN - a more...