Christiana Care Health System, which operates a network of hospitals, is working on several risk management priorities for 2018, including adopting the HITRUST framework, implementing appropriate controls for protecting against emerging threats and phasing in new security technologies, says Anahi Santiago, CISO.
Are unpatched vulnerabilities leaving you at risk?
At the rate of almost half of all attack types, hackers are using injection attacks to take advantage of vulnerabilities in operating systems and applications to penetrate networks and databases.
Download this whitepaper and learn:
How attackers are using...
Email, which is too easily spoofed, phished or taken over, remains a leading cybersecurity risk. But finally, after years of pushing, the Domain-based Message Authentication, Reporting and Conformance standard, or DMARC is helping to bolster email security, says Phil Reitinger, CEO of the Global Cyber Alliance.
If you want to anticipate a prospective hacker's moves, then you'd better be able to think like one. That's the position of Terry Cutler, an ethical hacker who dedicates his time to testing organization's cybersecurity defenses - and their people.
As data breaches increase in scale and frequency, businesses must ensure an effective, swift and well-orchestrated response. To help them, ISMG on Wednesday and Thursday will host a Fraud and Breach Prevention Summit in Mumbai offering insights from 20 leading CISOs and many other experts.
New research shows that the automation of five key security controls is lacking at a majority of organizations, says Ted Gary of Tenable.
A key reason why: the lack of skilled cybersecurity professionals.
Improving network security requires understanding your environment and controlling it before implementing network segmentation, says Nathaniel Gleicher of Illumio, who explains lessons that can be learned from the Secret Service's approach.
This US aerospace research and development organization tackles one of the most ambitious engineering projects in the world - the design and creation of space exploration vehicles capable of transporting people into orbit.Their biggest security challenge was remaining vigilant and adapting to new threats while being...
As one of the top 20 largest providers of information technology services to the financial services industry, the company in this case study spends a considerable amount of time and resources ensuring that both its data and its customers' data is secure.
Due to the tremendous amount of time involved in detecting...
Yes, malware commonly targets the Windows operating system. But if you limit malware analysis to Windows OS, you're leaving gaping vulnerabilities, says Christopher Kruegel of Lastline Inc. Here's how to maximize your analysis.
One common limitation of malware analysis is that organizations focus too much of their...
Medical devices are increasingly used by cybercriminals to compromise networks, systems and patient data, says Dr. Jack Lewin of the consultancy Lewin and Associates, who's also chairman of the National Coalition on Health Care. That's why physicians should be advocates for better device security.
U.S. government agencies now find themselves having to comply with Binding Operational Directive 18-01 to enhance email and web security. But what are the immediate tasks for agencies to undertake?
Download this eBook on enhancing email and web security and learn about:
The toughest compliance task facing...
We all see the headlines about high-profile breaches that started because of a phishing exploit. But how severe is the global email infiltration problem?
90 percent of data breaches investigated by the secret service, law enforcement, and forensic companies start from an email infiltration, according to the the...
As defense stategies become stronger year after year, it seems as though the prevalence of malware is growing proportionately, projected to exceed $2 trillion by 2019 - a four-fold increase in the cost of security breaches over 2015.Posing a threat to every industry, profession, and company, malware not only...