Before public cloud services, large-scale computing infrastructure was expensive, hosted on-premises and reserved for big enterprises, governments, and universities. Now, anyone with a credit card can access an unlimited supply of cloud apps and computing power.
While cloud computing offers many benefits, its...
Why do so many data loss prevention projects either stall or de-scope? Why with significant industry expenditures in the space do we continue to experience record-breaking instances of data breaches and exfiltration? What are the latest methodologies and technologies security and privacy executives should consider to...
If your organization is in the early stages of your journey to find a vendor risk management (VRM) solution, a frequent challenge is that many teams are simultaneously educating themselves on what a vendor risk program necessitates while evaluating technology solutions to assist with the relevant decision-support...
Companies like yours spend millions of dollars each year assessing and mitigating threat vectors within the company. But when it comes to the management of third-party cyber risks, management and tracking typically follow archaic and highly manual processes. Despite its complexity, vendor risk management doesn't...
Regardless of industry or function, every company relies on an ecosystem of other providers to deliver goods and services. Suppliers and vendors, partners and affiliates, and even customers - collectively, third parties - form a strongly connected network that, while essential for business, introduces hidden...
You can't stop cyberattacks from happening altogether, but you can take proactive measures to better weather the storm and reduce the risk of damage. Among the keys to surviving a cyberattack is mitigating risk on the assets and the network layer. That includes knowing what and where your data resides in the network...
The abuse and/or misuse of privileged credentials plays a role in almost every cybersecurity breach incident today. With privileged access in hand. an attacker essentially becomes a malicious insider - and that's an alarming scenario for any IT professional, all the way up to the C-level and the Board.
Privileged...
What's hot on the cybersecurity legal front? For starters, in 2018, the U.S. Department of Justice indicted twice as many alleged state-sponsored attackers than it had ever indicted, says Kimberly Peretti of Alston & Bird.
Migrating computing resources to cloud environments opens up new attack surfaces previously unknown in the world of premise-based data centers. Cloud workloads are vulnerable to data breaches, account compromises, and resource exploitation.
Read Anatomy of a Cloud-Native Data Breach to follow the dissection of a...
The network is much more than just the sum of its endpoints, and the imperative to secure everything has led to detection and response emerging as a top priority for many organizations, says Chris Morales of Vectra Networks.
application attacks are the top source of breaches today. The 2018 Cybersecurity Insiders Application Security Report reveals that 62% of cybersecurity professionals are at best moderately confident in their organization's application security posture. Not surprisingly, about the same number consider their...
Vera has partnered with UBM to produce the 2019 State of Encryption Research Report. The survey explores the use of encryption and access controls, to understand how organizations currently use these technologies, and to identify IT and security professionals' top priorities in file security.
Watch this webinar to...
Stay Ahead of Phishing Threats This Year
In volume and complexity, phishing attacks are getting worse. The Verizon Data Breach Investigations Report 2018 found that over 90% of breaches begin as phishing emails or other social engineering tactics.
To get ahead of the problem, download this eBook on phishing trends...
The digital revolution has given healthcare organizations new tools to increase team efficiency and improve their customer experience. But it's also opened up new vectors that cybercriminals can use to attack. As your attack surface expands to infrastructure that you don't own or control, becomes increasingly...
The coming end-of-support for Windows Server 2008 leaves organizations with few viable options to receive updates beyond the cut-off date of January 14, 2020. Upgrading will be no small feat as roughly 70% of enterprise Windows applications run on Windows Server 2008 or earlier versions*.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.