Privacy & Security

By Rick Kam 09:49 am November 16, 2015
While cyber-attackers are becoming ever sophisticated at stealing information from business systems, gaining entry into those systems is relatively easy because employees, vendors and sometimes customers are not very sophisticated at keeping them secure.
By Chris Bowen 10:09 am November 13, 2015
The Ashley Madison hack should raise two immediate questions for organizations everywhere: Do they house sensitive and potentially embarrassing data? If so, is it adequately protected from both internal and external threats?
By Stuart Pologe 10:27 am November 11, 2015
For many healthcare organizations, it's a challenge to manage digital and paper materials while balancing the need for efficiency and compliance with the Health Insurance Portability and Accountability Act.
By Nathan Wenzler 01:21 pm October 29, 2015
In 2015, it seems like barely a month goes by without another report of a data breach suffered by a healthcare organization exposing personal information about patients or employees. Here's to a better 2016.
Warriors
By David Finn 08:00 am October 28, 2015
(SPONSORED) Healthcare is under siege, and Advanced Persistent Threats (APTs) pose a particular problem. Find out how to meet wily APTs head-on with a careful, best-practice approach combined with a layered security strategy.
Padlocks and computer code
By Rick Kam 08:28 am October 19, 2015
The days of James Bond and his world-saving exploits are over. In today's reality, nation-states and their criminal partners can disrupt commerce and defenses in the free world from the safety and comfort of their computer desks.
By Axel Wirth 10:57 am October 12, 2015
(SPONSORED) If the prospect of hackers honing in on medical devices makes you uneasy, it should. Medical devices are being exploited as entry points for deeper attacks on systems within a healthcare organization.
By Rick Kam 10:03 am October 05, 2015
Most people navigate the World Wide Web via well-known search engines such as Google or Bing. Underneath the publicly accessible web, however, is the "Deep Web," the part of the web that is not indexed by common search engines.
By Keith Tyson 08:45 am September 21, 2015
You don't need to take a defensive stance that restricts data exchange.
By Rick Kam 11:05 am September 15, 2015
If you're concerned with data security or privacy these days -- and who isn't? -- you need to understand the fast-changing world of cyber-crime, cyber-terrorism and cyber-espionage.

Most Read

The Daily Brief Newsletter