David Finn, a former healthcare CIO, says he agreed to join a new Department of Health and Human Services cybersecurity task force because he supports its mission of involving representatives of all healthcare sectors in the effort to tackle challenges. In this interview, he outlines key security issues.
Unlike other security and breach reports, Verizon's Data Breach Digest is a collection of data breach investigation case studies from around the world. Verizon's Ashish Thapar elaborates on findings from this digest.
Cybersecurity competitions are being adapted so employers can use them to vet the know-how of prospective employees, U.S. Cyber Challenge National Director Karen Evans says.
A Hollywood hospital acknowledges paying ransom to unlock data seized by attackers. But while experts generally caution against paying extortionists, some organizations do indeed fold under the pressure to get their critical data back quickly.
Human beings are the weakest link within any organization, presenting new opportunities for cybercriminals to infiltrate your company. But your employees can also be your first and best line of defense. With a robust security education program in place, your company can protect its most sensitive information by...
Even as the demand for security professionals grows, the outflow of practitioners from the profession is greater than the influx of fresh blood, says (ISC)² CEO David Shearer. How can this trend be effectively addressed?
Does new advice from federal regulators on how healthcare organizations can mitigate cyber threats focus on the right issues? Security experts weigh in on the new "cyber-awareness initiative."
The trend across industries is that automation results in a drastic reduction of operational job roles, even as it brings in economies of efficiency. What then does automation in security mean for the profession?
Mobility and IoT are acknowledged by security practitioners to be a whole different beast when it comes to management. MetricStream's French Caldwell says that GRC likewise needs to change its paradigm to accommodate this disruption.
In 2014 the National Institute of Standards and Technology (NIST) introduced a Cybersecurity Framework in response to an executive order calling for "a set of industry standards and best practices to help organizations manage cybersecurity risks". Since then, this Framework has evolved to become one of the most cited...
No responsible enterprise would operate without firewalls, intrusion detection systems, and other technology-based controls to safeguard its information. But how are you addressing the ultimate security endpoint-the human? What protection, if any, do your people get?
Unfortunately, there is no firewall technology...
One of the most dangerous myths about malware is that hackers aren't targeting smaller healthcare entities, says security researcher Lysa Myers, who offers mitigation insights for clinics and others.
Most advanced attacks rely as much on exploiting human flaws as on exploiting system flaws. Proofpoint developed this report, The Human Factor, to explore this under-reported aspect of enterprise threats using data gathered from the Proofpoint Targeted Attack Protection product deployed in customer environments,...
When enterprises are determining their cybersecurity budgets, there is one element that cannot be ignored - the input of the Board of Directors. Research shows that when executives get involved and truly understand the risks to their organizations, security budgets increase.
How do you present a compelling case to...
Ireland's Cyber Crime Conference in Dublin drew a capacity crowd for a full day of security briefings, networking, hotly contested capture-the-flag and secure-coding challenges, as well as a chance to sharpen one's lock-picking skills.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.