From top to bottom, today's CISO needs a wide-ranging set of skills to be successful in defending their organization against hackers in the current threat landscape. Whether you're thinking of replacing your current CISO, considering bringing one on board, or are interviewing for the role, you must have a thorough...
Adopting standardized best practices, as embodied here in Hitachi ID Identity Express, has a positive impact on Identity and Access Management (IAM) implementation and operation. IAM implementation using Identity Express is faster, costs less and incurs less risk since operation is optimized, incorporates rich...
In 2016, three absolute facts were made relevant when it comes to security: 1) an organization cannot prevent all attacks; 2) an organization's network is going to be compromised; and 3) 100% security does not exist. This means that adversaries will breach your organization's protection � if they haven't already. The...
IT security industry has developed new methods and technologies to help reduce the threat of a major breach while reducing the cost of day-today upkeep. The common way of protecting systems is to employ discrete tools such as software intrusion detection and firewalls. A more efficient and sophisticated approach,...
It's a story you'll watch unfold time and time again. The breach. The headlines. The confusion. The public apologies. The finger-pointing. And it's often followed by some form of the following statement: "But I was compliant." Compliance is never enough. The challenges are understandable, but taking the path of least...
The Health Information Trust Alliance (HITRUST) began a search for a secure cloud solution for their Common Security Framework (CSF) application. CSF gives businesses the structure, detail and clarity needed to more efficiently and effectively meet healthcare regulatory compliance standards, including HIPAA.
The...
Demonstrating return on investment (ROI) for vulnerability management or continuous monitoring - or any other security solution- is difficult, at best. However, with a strong foundation of vulnerability assessment, effective use of vulnerability management and analytics and leveraging of capabilities of continuous...
To help simplify the difficulties associated with HIPAA compliance, the Health Information Trust Alliance (HITRUST), a non-profit organization, collaborated with leaders in healthcare and information security to develop the HITRUST Common Security Framework (CSF). CSF is a certifiable security framework that scales...
Same-day Automated Clearing House (ACH) payment processing became a reality. While this represents a terrific opportunity for banks to be responsive to their customer's requirements for faster ACH payments, plus the ability to attract new customers from banks who choose not to offer the same level of responsiveness,...
A recent incident involving a vendor using a Boston clinic employee's credentials to inappropriately access patient data via a regional health information exchange illustrates the potential risks involved as the use of HIEs continues to grow.
It is more crucial than ever for companies in the financial industry to better manage risk and keep high-value data safe. In this case study of a regional bank, "Proactively Challenge Cyber Threats in the Financial Industry," you will learn how monitoring the appearance and price trends of specific Bank Identification...
Information security is in the midst of a major shift. What had been a purely technical, defensive, IT problem is now a whole-organization risk management problem. As the industry undergoes this wholesale shift in mindset, enterprises are struggling to catch up.
Gone are the days of installing a few defensive...
How do companies in the healthcare industry better manage risk and keep their most valuable data safe when stolen healthcare information commands such a high price on the dark web? Download the case study, "Proactively Challenge Cyber Threats in the Healthcare Industry," to learn how this healthcare organization...
The dark web is one of the most commonly occurring, but most poorly defined terms in information security. The dark web is actually smaller than most of the mythology would have you believe. Another common myth is that the dark web is entirely used for criminal activities. While criminal activities do abound,...
Understanding your adversaries' tools, techniques, and processes (TTPs) that they're likely to weaponize is the best way to anticipate and combat threats. This whitepaper shares research on the latest attacker tools, provides architecture recommendations for organizations looking to strengthen security controls, and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.