We all know that May 25 was the enforcement deadline for Europe's General Data Protection Regulation. But what impact will General Data Protection Regulation have on cybersecurity programs?
GDPR, or the "Y2K" of our era, is part of a larger conversation that's been catalyzed by a lot of the recent news around...
Technology, regulations and customer expectations all have evolved, but what does this mean for how organizations secure identities?
This evolution has proven to be a two-sided coin, particularly for financial institutions. It's not only allowing financial institutions to offer new, innovative products where...
With the advent of technology in personal healthcare - internet connected glucose monitors, intravenous blood pressure monitoring, personal best friend emotional bots - a lot of highly sensitive data that's rampantly traversing the airwaves. The impact of this data getting in the wrong hands is just starting to be...
As of Q1 2018, the global cybersecurity community finds themselves inundated with both internal and external advanced threat actors who are stealthier, more resilient and sadly, more effective than they have ever been before. Many organizations are coming to terms with deciding whether their security posture is...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Christiana Care's Anahi Santiago on 2018 risk management priorities. Another influencer, Lewin and Associates' Dr. Jack Lewin discusses the latest medical device security threats. This...
The role of the CISO is growing in importance, as is the need to have an enterprise-wide IT security strategy that supports the company's mission and goals.
Download this research report and learn why:
The CISO role is becoming more critical in managing enterprise risk;
CISOs must articulate IT security...
Even the most well-intentioned employees risk leaking sensitive data or inadvertently letting in malware that can wreak havoc on your network and systems.
Give your employees the proper training and knowledge to make them your most important line of defense against cyber threats.
Download this checklist and...
Identity and Access Management (IAM) programs are becoming increasingly essential to securing critical systems and data; last year, companies spent $7 billion on IAM, most on protecting user credentials, but almost nothing protecting keys and certificates, the credentials that identify and authorize machine-to-machine...
In a world where cyber threats have become the norm, organizations must equip themselves with solutions that prevent and isolate attacks. Today, many organizations are mandating Internet separation as a means of controlling these threats. While physical Internet separation or air gap networks is one possible approach,...
In the age of digital transformation, maintaining secure interactions among users, applications, and data is more complex than ever. Security threats are also on the rise, and are becoming more sophisticated. When the only constant is change, it's time to re-evaluate how IT approaches security, and how it can adapt to...
The biggest companies often take matters into their own hands when it comes to breach prevention, eschewing long-term relationships with vendors and charting their own courses with a dizzying array of technologies. Meanwhile, smaller companies fall further behind, struggling to find talent and budget, while security...
Automation speeds up the delivery of applications by automating the delivery of the resources they require, including networking, security, and the infrastructure that supports application development.
Download this whitepaper and learn how automating IT can solve challenges such as the lack of standardization and...
When your IT organization embraces an approach that fully automates the delivery and management of infrastructure and applications, including network and security operations, you are positioned to accelerate service delivery and respond faster to the dynamic needs of a digital business. Automation helps you eliminate...
When it comes to cyber risk, how must the CISO manage communications across the enterprise? The board, the staff and the line-of-business leaders all have different needs.
Historically, security leaders have communicated mainly upward to the CEO and to the board, and it's all been about numbers - how many...
Managing a major application for a large enterprise can take days to investigate and confirm. With the right tools today, it would take two hours.
This is a common experience for application managers.
Download this whitepaper to learn how to compress the time needed for vulnerability management.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.