As CEO of ForeScout Technologies, which focuses on continuous monitoring of networks, T. Kent Elliott says he has to anticipate the next generation of vulnerabilities. So what's the most significant emerging risk? The Internet of Things.
This past year saw the revelation of three massive security bugs that existed for lengthy periods of time before they were discovered. This infographic details those exploits and just how long they went unnoticed.
Users' fear of data loss on personal devices must be balanced with an organization's need to protect sensitive information, says ZixCorp's Nigel Johnson. He explains the evolution of mobile device management.
HealthcareInfoSecurity launches its fourth annual survey to measure progress toward ensuring the privacy and security of healthcare information as more records are digitized and shared, and as more cyberthreats emerge.
Federal regulators are sending a powerful message about the importance of applying software patches by slapping an Alaska mental health services providers with a $150,000 HIPAA sanction. Learn what's included in the corrective action plan.
The "wiper" malware attack against Sony Pictures Entertainment has numerous commonalities with previous wiper attacks in Saudi Arabia and South Korea. This infographic summarizes the attacks and highlights their similarities.
Technology will always play a critical role in security. Yet, companies cannot rely exclusively on the tools. People present a number of security-related problems that companies must address with education.
Lost and stolen mobile devices might be a leading cause of data breaches. But it's a strategic mistake for enterprises to focus too heavily on device security, says Christy Wyatt, CEO of Good Technology.
It's time to consider amending the HIPAA Privacy Rule to enable the sharing of certain research data, without patients' authorization, to help improve the quality of care, contends Douglas Fridsma, M.D., a former federal health IT leader.
Has your personal information been compromised in a data breach this year? This infographic showcases incidents that have affected various sectors, from banking to restaurants, proving that no industry is safe from a cyber-attack.
A government watchdog has begun auditing payments by state Medicaid agencies to hospitals participating in the HITECH Act electronic health record incentive program. Find out about plans for other HITECH audits, including scrutiny of security.
A new U.K. government report accuses social networks of serving as a "safe haven for terrorists," inflaming what some see as tense relations in the post-Snowden era between the British government and Silicon Valley.
A massive international operation has resulted in the arrest of 118 people suspected of using stolen card data to buy airline tickets, or using fake tickets, thanks to big data capabilities for combating crime.