With major data breaches in the news and high-stakes security regulations in effect - including GDPR and the NIS Directive - CISOs worldwide are scrambling to comply with IT standards and avoid hefty fines. Privileged Access Management (PAM) streamlines compliance and overlaps with the requirements of many...
Protecting the Department of Health and Human Services' systems, data - and program beneficiaries - from evolving cyberthreats is a top challenge for the agency, according to a new report that recommends action items.
As attackers increasingly take advantage of users' risky behavior, enterprise security leaders are taking steps to improve end-user security education. Gretel Egan of Wombat Security outlines how to focus on education strategies that are truly effective.
Applications run the world. From sophisticated e-commerce engines to personal tools on mobile phones, applications power how things get done.
Safeguarding them is key to ensuring the digital experience. Radware surveyed 300+ senior executives and IT professionals from around the globe for their insights into these...
Over the last five years, cybercrime occurrences have escalated dramatically, taking hold of organizations
worldwide - affecting revenue, productivity, information security, and reputation. In 2017 Cost of
Cybercrime Study, the Ponemon Institute emphasizes that, on average, organizations have paid
$11.7 million USD...
The modern enterprise is relentlessly challenged by the number of insider-related variables and risk factors when building an enterprise security defense. Even with an established program, factors like technological innovation, shifting business priorities and public discourse can quickly force the need to re-examine...
After an initial effort got off to a rocky start, the Department of Health and Human Services has started over, making a second attempt at launching a cyber coordination center that aims to help the healthcare sector improve its defenses and boost information sharing. Will the latest effort prove successful?
Despite the harsh reality that card not present (CNP) fraud is a serious problem that which is only getting bigger, senior management is not giving this issue the attention that it deserves.
Some executives fail to recognize the correlation between fraud management and the organization's overall growth and...
A coding error in a portal of the Employee Retirement System of Texas inadvertently allowed some users to view the information of others, potentially exposing information on 1.25 million of its members. Why are breaches involving coding mishaps so common?
At RSA Conference 2018 Asia Pacific & Japan, Information Security Media Group conducted dozens of video interviews with industry thought leaders. Here are the highlights.
Those of you who are CISOs and have been conducting awareness programs for years realize that ''the devil is in the details" when building a successful program. Initial attempts to get an awareness program started are usually done by trial and error- but this hit-and-miss approach is often ineffective or frustrating....
The biggest security budget in the business cannot save you from also suffering one of the biggest breaches. The key is: Do you have the right skills and technology deployed to defend your critical assets? Michael Malone and Ben Johnson of Datashield, an ADT company, make the case for outsourcing.
A recent hacker attack targeting a revenue cycle management software and services vendor, which impacted more than 31,000 patients at 11 healthcare organizations, illustrates the potentially broad security risks posed by business associates.
CISOs must make sure the board of directors is well-informed about security issues before they make decisions on setting priorities, says Stephen Katz, the world's first CISO.
IT's relevance is driven by its ability to become smarter and better aligned with the transformation needs of the business.
Download this whitepaper to learn how Splunk IT Service Intelligence can help you drive technology enablement and innovation into business process and operations, as well as monitor and manage...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.