As seen on YouTube, South Carolina Gov. Nikki Haley, more than any other chief executive, in or out of government, is out front leading the response to a breach of its tax system. It's been an education for the governor as well as South Carolinians.
Today's intrusion prevention systems (IPS) provide advanced security intelligence and the ability to identify and block malware before it can enter your network so that you can defeat these sophisticated evasion techniques. To be effective, your IPS should be able to perform each of the functions listed in the...
Despite numerous data breaches, as well as financial incentives and penalties, many healthcare organizations aren't taking risk assessment requirements seriously. Experts offer insights on best practices.
Leaders at four security technology companies say the recent distributed-denial-of-service attacks against 10 U.S. banks highlight the need for new approaches to preventing and responding to online outages.
Like most enterprises, you're deployed encryption broadly to protect information and authenticate systems. Yet what impact does poor encryption management have on your business? According to Aberdeen, poor key management practices are costing organizations millions in security and compliance-related incidents, and...
Data thieves are directing attacks at user credentials like never before. Over 50 million passwords have been stolen in large smash-and-grab, server-side attacks this year alone, affecting millions of consumers and their online accounts. Organizations continue to struggle with how to prevent these attacks and...
Gov. Nikki Haley realizes the potential political consequences of a breach, which explains why she held three press conferences on three consecutive days to address her administration's response to a computer breach of the state's tax IT system.
Text-messaging by physicians and other clinicians poses serious potential patient privacy risks. But with security controls in place, some healthcare organizations are giving a green light to texting in certain circumstances.
It's difficult to know where sensitive patient information may be lurking in user files. But some healthcare organizations are finding ways to detect where the information resides so they can protect it. Find out how.