Although information security analysts will be the fastest growing overall job category, the supply of analytics talent isn’t rising fast enough to meet this demand. Charles Eaton believes that good technologists can make great information security analysts, and that tweens and teens should become a focal point in this area.
Imagine for a moment you had a twin that you didn’t know about. A virtual copy of you that shopped where you shopped, read what you read, and was interested in exactly the same things you were. For all intents and purposes, this twin was you but with one big difference; this copy of you cared almost nothing about your privacy. Surprise! This copy of you exists and isn’t going away any time soon. So… now what? Well, for starters, you should read this Q&A between Jason Elrod and Sean Martin.
Between the massive amounts of data flowing through a company, the difficulty of managing its IT systems internally, relying on data synchronization and backup services, and the need to be budget conscious, much of this data may reside outside the firewall. But the use of convenient inward-out systems can put your company at risk if not managed properly.
Is cybersecurity insurance a necessary evil? Assuming it is, how can organizations make the most of their audit and compliance efforts to get the best coverage and rates possible? Expert Alan Zeichick speaks with experts from multiple angles to see how best to streamline the application process.
Since 2013, Gemalto’s Breach Level Index (BLI) has been used to track data breaches and measure their severity based on multiple dimensions, including number of records compromised, types of data, breach sources, how data was used and whether it was encrypted.
Despite an increasing number of organizations are choosing to embrace the bring your own device (BYOD) trend, there are still considerable security risks involved that many are not aware of. This article will explain what are the possible security risks involved with BYOD and how to prevent them.
When it comes to ingesting, digesting, and applying threat intelligence in a meaningful way, it can seem like information overload. With their Threat Catalogue, HITRUST is helping the healthcare industry overcome this challenge with a complete list of security and privacy threats geared toward the threats the industry faces on a daily basis.
Bridging the talent gap means more than producing a diverse cybersecurity workforce today – it will require looking into the future of the criminal mind.
When lives are on the line when the latest Ransomware message comes in, perhaps we'll wish we looked back over time to predict what could happen in the future.
At the end of June 2016, bad actors published 10,000,000 stolen record for sale. Experts in cybersecurity, Andrew Komarov, Balázs Scheidler and Adam Laub, discuss findings uncovered in a recent InfoArmor report: Healthcare Under Attack: Cybercriminals Target Medical Institutions.
This HITRUST conference proved highly relevant and extremely valuable to all professionals concerned with the health industry’s ongoing efforts to protect health data and other personally-identifiable information from the cyber threats targeting our businesses and institutions. Read these top 20 tips to see what the attendees heard.
Their data is lucrative, often unprotected, and useful for all types of fraud including medical and identity fraud. Expert Luther Martin of HPE Security - Data Security explores these attacker gold mines.
A full five days into the ongoing MedStar Health attack, the US Department of Homeland Security and the Canadian Cyber Incident Response Centre issued a joint alert on the surge in ransomware extortion attacks.
Andrew Komarov, Brian Laing, Csaba Krasznay, John Gunn, and Carmine Clementelli dig deeper into the world or ransomware.