As security threats are more sophisticated today than in the past, modern data centers are becoming increasingly vulnerable. Micro-segmentation is your answer to protect your data center against these sophisticated threats. Read this trend brief to see how it builds security into the DNA of the data center for a...
Adversaries are outsmarting enterprise security strategies by exploiting the foundation of online security. Cyberthreats are becoming more complex and harder to detect. Intel predicts the next big hacker marketplace to be in the sale of digital certificates, which are already selling for more than $1,000 each in...
Along with DNS, digital keys and certificates are at the foundation of any layered cybersecurity defense. Moreover, keys and certificates are akin to HLAs (Human Leukocyte Antigens) because they serve as unique identifiers giving authorized users access to encrypted systems.
But vulnerabilities, such as Heartbleed...
The amount of sensitive information managed by business is
immeasurable. Proprietary data, intellectual property, personal
data collected from employees, former employees and job
applicants - all create a treasure trove of data, and IT has the
seemingly insurmountable challenge of securing it without
impeding...
We've all heard about Apple's refusal to comply with a court order to assist the FBI in bypassing security features built into an iPhone that was issued to a San Bernardino shooter. The resulting debate - and the implications for law enforcement, national security, privacy and personal freedom - have led to serious,...
The adoption of encrypted Internet traffic has exploded in recent years due to security and privacy concerns. Today, it is estimated that more than 65% of Internet traffic will be encrypted by the end of 2016. This increase in encrypted traffic has created a more secure exchange of data"but it has also created a space...
The security of Internet-connected toys is in the limelight after toymaker VTech acknowledged suffering a data breach that affects 5 million accounts and personal information and photographs relating to more than 200,000 children.
The lead cybersecurity official for Britain's GCHQ intelligence agency dismisses charges that the U.K. conducts mass surveillance. But critics question the government's introduction of the Investigatory Powers Bill.
The Department of Homeland Security will establish a Silicon Valley satellite office to improve relations with IT security vendors and recruit cybersecurity talent, Homeland Security Secretary Jeh Johnson said in a keynote address at RSA Conference 2015.
The Massachusetts Attorney General has fined Beth Israel Deaconess Medical Center in Boston as a result of a 2012 breach involving a stolen unencrypted laptop. Find out the size of the penalty.
Cedars-Sinai Health System says approximately 33,000 patients were affected by a data breach involving the theft of a laptop computer from an employee's home. Find out what information is at risk.
Millions of user credentials are breached regularly - whether we hear of the incidents or not. So, why do we continue to rely on passwords? Derek Manky of Fortinet discusses authentication and data retention.
The federal tally of major health data breaches has grown substantially in recent weeks. Incidents added over the last month provide examples of the variety of risks that healthcare entities continue to battle.
It's well known that lost or stolen unencrypted computing devices account for the majority of large health data breaches. But a new report from the Department of Health and Human Services shines a light on how frequently breaches - especially smaller ones - involve paper records.
As organizations expand their use of encryption to help prevent breaches, they must improve their management of cryptographic keys, says Prakash Panjwani, senior vice president at SafeNet.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.