Ransomware attacks, which initially targeted Windows computers and then spread to Android mobile devices, are now targeting Linux servers as well, says Bob Lynch of Bitdefender, who describes a risk mitigation strategy in this video interview.
Over the past two years, DDoS attacks have grown in strength and in purpose - they are often used now as a tool of extortion, says Richard Meeus of security vendor NSFOCUS. How should security leaders prepare to respond to these strikes?
Encrypting healthcare data is a no-brainer, right? It keeps your organization off the Wall of Shame in the event of a breach, and it's just the right thing to do. So, why are so many healthcare entities still failing to encrypt?
As more organizations take advantage of cloud computing, it's essential that they set precise security expectations with their vendor partners, Carson Sweet of CloudPassage says in this video interview.
A lack of incident response planning often leads to an unanticipated series of serious consequences for organizations that experience data breaches, Joey Johnson, CISO of Premise Health, says in this video interview.
Organizations in all sectors need to be aware of newly emerging insider threats, including those tied to the dark web, Michael Theis of Carnegie Mellon's CERT Insider Threat Center explains in this video interview.
Cloud-based services can be both a "blessing and curse" when it comes to dealing with security, says John Houston, CISO and associate counsel for the University of Pittsburgh Medical Center, who explains why in this video interview.
When physicians and nurses use their own mobile devices to access clinical information and communicate with patients, an advanced form of encryption can help ensure all sensitive data remains secure, Jonathan Cohen of Synchronoss explains in this video interview.