Too often enterprises fail to adequately vet their cloud service providers, which can create security vulnerabilities, according to IT security lawyers Francoise Gilbert and Ellen Giblin.
The privacy profession is evolving rapidly, and security leaders increasingly need to understand the unique demands and responsibilities that come with protecting privacy. But where do they gain this insight?
The Target breach was the hot topic for many RSA 2014 attendees, but Gartner's Avivah Litan was already talking about the next Target - a UK retailer that may have suffered a similar hack, exposing payment card data.
The cybersecurity framework, the package of best IT security practices issued in mid-February, isn't set in stone, but will evolve in the coming weeks, months and years, says the framework's point man, Adam Sedgewick.
Troy Leach of the PCI Security Standards Council says data security standards are not failing; they just aren't being applied continuously. And conformance with the Payment Card Industry Data Security Standard is just one piece of the puzzle.
The security profession isn't quite prepared to deal with the full ramifications of the 'Internet of things,' says incoming ISACA president Robert Stroud. What other challenges await security pros?
Intel Security CPO Michelle Dennedy has just written the book on privacy. What are the key components of her manifesto, and how can her ideas reshape how security pros approach privacy?
Most organizations have yet to realize the cybersecurity benefits of big data analytics, says Russell Thomas of Zions Bank. He explains steps the pioneering bank is taking to revolutionize its big data operations.
White House Cybersecurity Coordinator Michael Daniel says the toughest international cybersecurity challenge facing the Obama administration is getting cooperation in coordinating responses to online crime.
NIST information risk guru Ron Ross, in a video interview, previews new guidance from the National Institute of Standards and Technology that's aimed at helping organizations architect their IT infrastructures to be secure from the get-go.
Cybercrime. Privacy. The power of big data and mobility. These issues are as challenging to India as they are to any global region. Vinayak Godse of DSCI discusses his organization's role in improving cybersecurity.
Imagine if an organization received a cybersecurity rating - just like an individual receives an objective credit report. This is the new model promoted by Stephen Boyer and his company, BitSight.
With a decade under its belt, ENISA enters 2014 with a mission to improve cybersecurity across Europe by collaborating with companion agencies around the world, says Executive Director Udo Helmbrecht.
Rick Howard, CSO of Palo Alto Networks, has a new idea for security pros: the cybersecurity canon of books every cyber pro must read at least once in their careers. Which titles make the list?
Identity is the new perimeter, and that concept stretches organizations into lots of new directions when managing access and privileges - especially in the mobile age, says John Hawley of CA Technologies.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.