Privacy & Security
03:29 pm November 30, 2015
It's not exactly a secret that there's a worldwide shortage of experienced cyber security professionals. At least one widely-cited report has put the figure at over a million unfulfilled positions.
09:49 am November 16, 2015
While cyber-attackers are becoming ever sophisticated at stealing information from business systems, gaining entry into those systems is relatively easy because employees, vendors and sometimes customers are not very sophisticated at keeping them secure.
10:09 am November 13, 2015
The Ashley Madison hack should raise two immediate questions for organizations everywhere: Do they house sensitive and potentially embarrassing data? If so, is it adequately protected from both internal and external threats?
10:27 am November 11, 2015
For many healthcare organizations, it's a challenge to manage digital and paper materials while balancing the need for efficiency and compliance with the Health Insurance Portability and Accountability Act.
01:21 pm October 29, 2015
In 2015, it seems like barely a month goes by without another report of a data breach suffered by a healthcare organization exposing personal information about patients or employees. Here's to a better 2016.
08:00 am October 28, 2015
(SPONSORED) Healthcare is under siege, and Advanced Persistent Threats (APTs) pose a particular problem. Find out how to meet wily APTs head-on with a careful, best-practice approach combined with a layered security strategy.
08:28 am October 19, 2015
The days of James Bond and his world-saving exploits are over. In today's reality, nation-states and their criminal partners can disrupt commerce and defenses in the free world from the safety and comfort of their computer desks.
10:57 am October 12, 2015
(SPONSORED) If the prospect of hackers honing in on medical devices makes you uneasy, it should. Medical devices are being exploited as entry points for deeper attacks on systems within a healthcare organization.
10:03 am October 05, 2015
Most people navigate the World Wide Web via well-known search engines such as Google or Bing. Underneath the publicly accessible web, however, is the "Deep Web," the part of the web that is not indexed by common search engines.
08:45 am September 21, 2015
You don't need to take a defensive stance that restricts data exchange.