Blue Coat CTO Dr. Hugh Thompson speaks about the future of security, the constants that need attention, and lessons to be learned from the U.S. when it comes to writing meaningful breach notification laws.
In a security landscape where the frenetic pace of technology has changed paradigms in ways organizations are struggling to cope with, Blue Coat's Hugh Thompson advises adopting a 'Degrees of Freedom' approach.
In the face of new cyber-attacks, enterprises must deploy new security intelligence platforms with analytics to gain greater visibility and reduce incident response time, says LogRhythm's Taylor-Mountford.
Gene Fay of Resilient Systems says the traditional method of solving risk issues through technologies no longer works. Instead, he says, security must be built on the foundation of an effective incident response plan.
Attackers could abuse flaws in Android's Stagefright media library to seize control of almost 950 million devices, just by sending a text, a security researcher warns. But will most devices ever see related fixes?
Amit Yoran, president of RSA, says Asian organizations must re-think their approach to security. He outlines five key steps to building a resilient cyber defense mechanism. But how do security leaders respond?
In the latest in a string of major cyber-attacks in the healthcare sector, UCLA Health confirms that information on 4.5 million individuals may have been exposed when hackers breached its network in an attack that appears to have begun last September.
In the wake of several mega breaches affecting its affiliates, the Blue Cross Blue Shield Association says all 36 of its affiliated plans will offer free identity protection services for as long as individuals are enrolled in their insurance coverage.
Subscribers and other consumers can more easily read, watch and listen to content produced for the websites of ISMG, as the company unveils a responsive design that enhances the features and functions of multimedia on multiple platforms.
HITRUST says a growing number of healthcare organizations, seeking to improve risk management, are requiring that their business associates comply with its Common Security Framework. But some experts question whether that's a viable strategy.
Recent breaches and regulatory audits have sharpened the focus on third-party risks. How are healthcare entities tackling this critical topic of business associate management? Attorney David Szabo shares insights.
When it comes to health data breaches, business associates are again grabbing headlines, calling attention to the importance of scrutinizing vendors. The latest incident involves a breach that wasn't reported to a covered entity for eight months.
With regulators gearing up to begin the next phase of HIPAA compliance audits, many covered entities appear to be overconfident about passing that scrutiny, according to the results of ISMG's latest Healthcare Information Security Today survey.