Advanced, ever-evolving threats call for security solutions vendors to counter with equally advanced and sophisticated solutions. JD Sherry of Trend Micro discusses new strategic alliances and product sets dedicated to creating new measures of threat defense.
As the only Diamond Media Sponsor at RSA Conference 2014, Information Security Media Group's coverage will be extensive. Check out what's in store during this world-class security event.
2014 is finally the "The Year of Security." When the year stars fresh on the heels of the announcement that Target has suffered a data breach that impacts tens of millions of consumer payment cards ... that gets attention. And when that's followed up quickly with a second major breach, this one of luxury retailer...
The RSA Conference 2014 will be held Feb. 24-28 in San Francisco, and Information Security Media Group will be the only Diamond Media Sponsor. Learn what's on the agenda at this world-class security event.
Editor's Note: Excerpts of this interview appear in ISMG's Security Agenda magazine, distributed at RSA Conference 2014.
Privacy should be built into the design of all healthcare information technology and related processes, says Michelle Dennedy, who's writing a book on the concept of "privacy by design."
Today's threat landscape is rapidly expanding to include cyber-attacks attributed to nation states. How must organizations respond? Mike McConnell, former U.S. National Intelligence Director, shares insight.
Attorney Kim Peretti helped put TJX hacker Albert Gonzalez behind bars, and now she is helping organizations investigate and respond to their own data breaches. What tips and tools does she recommend?
Some people say the U.S. faces a cybersecurity staffing shortage. Renowned computer science professor Eugene Spafford disagrees. He discusses what he sees as the real shortage and what we can do about it.
Where do organizations fail when defining privacy, and how can they best leverage technology to ensure privacy protection? Michelle Dennedy of McAfee and Trevor Hughes of the IAPP share perspectives.
Major cyberthreat concerns for banking institutions in 2014 include DDoS attacks, mobile malware, ransomware and insider threats, among others. Experts offer insights on mitigation strategies.
Most organizations today have breach response plans. But far too few test these plans before an incident occurs. Experts Michael Bruemmer and Ronald Raether discuss the essentials of breach response.
Here's a sampling of the many sessions at RSA 2014 that will provide timely insights for security specialists in the government sector on such topics as vetting foreign technologies and implementing the new cybersecurity framework.
RSA 2014 will offer many insights on how banking institutions can address a wide variety of security threats. Here's a guide to educational opportunities.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.