Employees with too much access can pose an insider threat. When employees have access to more than they need to do their job, there are more opportunities for mistakes, whether accidental or not. Lack of accountability means you
don’t know who did what, when. If too many people have the same level of access and...
Yelp gives its employees the flexibility to use the applications or tools required to be as productive as possible. With that flexibility, however, came the risks of Shadow IT, which is the use of software without explicit IT department approval. In order to allow their employees to maintain flexibility with...
With personal and professional lives merging at unprecedented rates, strong password hygiene is critical to your business’s success and security. IT teams must adapt to ensure employees’ credentials remain secure in a work-from-anywhere world.
Download this report to learn:
Become more security conscious...
Healthcare entities should implement a "proactive preparedness" approach for protecting their electronic health record systems, which are an increasingly attractive target for cyberattacks and other breaches, federal authorities warn.
Are data breaches getting worse? So far for 2021, the number of records that were reportedly exposed declined slightly, while the total number of reported data breaches increased both in the U.S. and globally.
Budget-strapped and short of cybersecurity talent, SMBs have a hard row to hoe when it comes to securing their businesses. Will Ehgoetz, manager of Threat Hunters at ActZero.ai, discusses the challenges SMBs face when they take a vector-by-vector approach to security.
A consolidated legal case that includes allegations of embezzlement, trade secret theft and intimidation offers an inside look at a complicated and messy alleged insider breach reported last year by a Texas-based accountable care organization.
Building a zero trust microsegmentation architecture is challenging for many organizations due to a combination of heterogeneity in compute, cloud, and networking, and the legacy use of denylist and allowlist combinations. However, with the key components of a zero trust microsegmentation architecture in place -...
For much of its long history, DLP has been treated as the little brother to antivirus solutions, largely using the same technologies. AV engines inspected inbound content at the ingress to look for bad things like malware, while DLP engines likewise used signatures to inspect outbound content for “good things,”...
Data leakage protection (DLP) has a well-deserved reputation for being challenging to implement and mostly ineffective for securing an organization’s sensitive data. Enterprises regard it as a check-the-box tool for compliance, a necessary evil that has low accuracy, is difficult to configure, annoys users by...
Before a data loss prevention (DLP) system can protect data, it must first know what data is sensitive (and what kind of sensitive). Data classification is the all-important prerequisite for data protection; without it, the system will be flying blind with no basis for detecting risks and enforcing policies. It is...
Regulators should require all medical device makers to include a baseline of certain cybersecurity protections in their products and to build in a feature that allows safe vulnerability scanning of their devices, says researcher Daniel Bardenstein, a strategist at CISA.
Whether it's clients demanding robust data protection, surging ransomware attacks, or risky behavior by company insiders, law firms are under pressure to implement a comprehensive data protection strategy.
Jefferies early investment in Prisma® Access, the best-in-class,
cloud-delivered security platform from Palo Alto Networks®, enabled a mobile workforce to persevere and prosper without missing a beat through the pandemic.
Download this case study to learn how this global investment banking firm blazes a new trail...
Ransomware attacks in 2021 amassed a record number of victims in critical infrastructure sectors across Australia, the U.K. and U.S., those countries' lead cybersecurity agencies warn. They share intelligence on attackers' latest tactics to better equip domestic organizations to defend themselves.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.