In this week's industry news roundup, IBM introduces new anti-fraud software and services, while Trustwave acquires Cenzic, which offers application security testing technologies.
With a decade under its belt, ENISA enters 2014 with a mission to improve cybersecurity across Europe by collaborating with companion agencies around the world, says Executive Director Udo Helmbrecht.
In the face of evolving threats and actors, traditional ID security strategies have been proven inadequate, says Entrust's David Rockvam. It's time for a security evolution.
Fraudsters continually find new ways to attack, but too many organizations rely on old, unsuccessful methods to detect and prevent fraud. This is the premise, says David Mattos, VP Sales, with Easy Solutions.
The Target retail POS breach is the most talked-about incident in recent memory - and it was entirely preventable with available security solutions, says Adam Tegg CEO of Wontok Solutions.
Many healthcare entities and business associates are average at best in their information security efforts. Other are failing. See what they're doing wrong, and how they can improve their grades.
Leading this week's industry news roundup, Fortinet has expanded its distributed-denial-of-service attack detection and mitigation product line, while Lockheed Martin has acquired Industrial Defender.
Leading this week's industry news roundup, Entrust releases a new version of IdentityGuard with biometric authentication capabilities, while Belkin unveils its Secure Web Camera Adapter.
The Obama administration's proposed fiscal 2015 budget would fund a new health IT safety surveillance program, as well as help bolster health data privacy and security activities.
NIST information risk guru Ron Ross, in a video interview, previews new guidance from the National Institute of Standards and Technology that's aimed at helping organizations architect their IT infrastructures to be secure from the get-go.
Identity is the new perimeter, and that concept stretches organizations into lots of new directions when managing access and privileges - especially in the mobile age, says John Hawley of CA Technologies.
Rick Howard, CSO of Palo Alto Networks, has a new idea for security pros: the cybersecurity canon of books every cyber pro must read at least once in their careers. Which titles make the list?
White House Cybersecurity Coordinator Michael Daniel assesses the cyberthreat environment facing the nation and explains what the federal government is doing about it.
With a decade under its belt, ENISA enters 2014 with a mission to improve cybersecurity across Europe by collaborating with companion agencies around the world, says Executive Director Udo Helmbrecht.
In the third full day of RSA 2014, ISMG's editors record exclusive video interviews with Michael Daniel of the White House and Udo Helmbrecht of ENISA. What are the common themes of these discussions?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.