Ann Barron-DiCamillo discusses how DHS is standing up the National Cybersecurity and Communications Integration Center to serve as the portal for the government and businesses to share cyberthreat information.
At the heart of recent high-profile breaches ... is phishing. Why can't we get a handle on these schemes and get better at stopping them? PhishMe CEO Rohyt Belani on how to strengthen security's weakest link.
The future of cybersecurity may be full of surprises. But these twists will cause a big sensation, says Christofer Hoff, vice president and chief technology officer at Juniper Networks.
As RSA Conference 2015 opens, ISMG's editorial team discusses the event's emerging themes and how they will be reflected in event coverage. What will be the key sessions and discussions in San Francisco?
As mobility cements itself as the ubiquitous technology of choice, the threats are evolving - and so must the defenses. Christy Wyatt of Good Technology on the future of enterprise mobility management.
Fidelis Cybersecurity is being spin off from General Dynamics. CEO Peter George discusses the company's bright future, leading organizations to improve their defenses against today's top threats.
The new Identity Ecosystem Framework is ready for review. What do security professionals need to know? Kimberly Little Sutherland of LexisNexis Risk Solutions shares insights on the future of online identity.
Most organizations are still doing poor jobs of adequately communicating threat information, even within their own organizations. Shawn Henry, President of CrowdStrike, offers strategies for the C-suite.
Are you heading to RSA Conference 2015 in San Francisco? If so, be sure to connect with Information Security Media Group. We'll be out in full force on the Expo floor, as well as running a number of must-attend sessions and events.
RSA Conference 2015 is expected to be the biggest gathering in the event's history. What's new at this year's event, and how can attendees get the most out of it? Program chair Hugh Thompson shares tips.
New, advanced point-of-sale malware dubbed "Poseidon" can exfiltrate card data directly from every infected device. And security experts warn that too many retailers fail to test POS devices and segment networks to mitigate all malware threats.
The Target breach was the hot topic for many RSA 2014 attendees, but Gartner's Avivah Litan was already talking about the next Target - a UK retailer that may have suffered a similar hack, exposing payment card data.
The cybersecurity framework, the package of best IT security practices issued in mid-February, isn't set in stone, but will evolve in the coming weeks, months and years, says the framework's point man, Adam Sedgewick.
RSA President Amit Yoran's focus is on refining RSA's vision, growth strategy and emerging technology. A key consideration in honing that strategy: the rise and pervasiveness of advanced threat actors.
Big data has been the recent buzz in security circles, but what are organizations missing by overlooking the power of "small data?" Verizon's Jay Jacobs discusses how to get the most from data analytics.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.