An analysis on rethinking where awareness programs fit in cyberdefense strategies leads the latest edition of the ISMG Security Report. Also, James Comey's cybersecurity legacy at the FBI.
The Food and Drug Administration will soon launch a new centralized digital health unit that will address the cybersecurity of medical device software, Bakul Patel, who is overseeing the effort, explains in this in-depth interview.
As organizations worldwide rush to mitigate the outbreak of the WannaCry crypto-locking ransomware, Adam Meyers of CrowdStrike shares insights on what researchers have gleaned from the attacks and how organizations should respond.
To better battle ransomware, we must take a page from the lessons learned by the kidnapping and ransom insurance industry in its battle against piracy in the Indian Ocean, Jeremiah Grossman told the AppSec Europe conference in Belfast, Northern Ireland.
Former Bush and Obama cyber adviser Melissa Hathaway says that over the past decade, more than 100 recommendations on improving government cybersecurity have been made but mostly ignored. Now the cybersecurity executive order signed by President Donald Trump will add dozens of new reports in 14 areas.
New draft guidance from the National Institute of Standards and Technology calls for using commercially available, standards-based technologies to improve the security of wireless infusion pumps.
President Donald Trump has signed a long-awaited executive order that places responsibility for cybersecurity on departmental secretaries and agency directors and emphasizes the use of risk management throughout the federal government to secure digital assets.
Microsoft has patched a startling vulnerability in its anti-malware engine, once again demonstrating that security applications can sometimes be the Achilles heel of a system.
Digital transformation is a growing, urgent imperative for enterprises and organizations worldwide. Network resources to support digital initiatives are coming under intense scrutiny.
Increasingly, that focus concentrates on the wide area network (WAN), which provides essential connectivity and valuable network...
Enterprises in all sectors are adopting digital technologies to improve back-office operations and strengthen customer engagement. Technologies like cloud computing, mobility, social networking, and big data and analytics are being applied to this transformation.
With a fundamental core in connectivity, digital...
The Masiello Group, a large regional provider of real estate and home ownership services, needed a flexible, scalable solution to connect their business with multiple offices across four states.
Download this whitepaper to learn what The Masiello Group did to leverage Ethernet, Data Center Solutions, UCaaS and...
It's no secret that Unified Communications (UC) breaks down the barriers to collaboration. Tools like instant messaging, presence management, mobility solutions, web and video conferencing, desktop sharing and unified messaging have been proven to open the doors to business-transforming productivity and...
The formula for achieving business success in today's always-on, always-evolving business environment begins and ends with innovation. It's a prerequisite for staying ahead of the competition and customer needs.
Likewise, constantly evolving your business model to align with customer buying behavior is the new...
An information technology juggernaut has left the station, gathering tremendous momentum as it rolls toward virtually every midsize and large organization. No, it's not the Internet of Things, software containers or even big data. It's the software-defined wide-area network (SD-WAN), a groundbreaking technology many...
The top 10 vulnerabilities typically account for 85% of successful exploit traffic. But complex, manual processes and disparate, disconnected tools make it difficult for security and IT teams to come together to respond to vulnerabilities before they lead to problems.
Join Jeff Battaglino from Seton Hall University...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.