This edition of the ISMG Security Report features updates from RSA Conference 2017 on emerging technologies, the forthcoming White House cybersecurity executive order and Microsoft's call for a "Digital Geneva Convention."
The uptick of ransomware and other cyberattacks in the healthcare sector has prompted healthcare provider RWJBarnabas Health to make a number of important moves to help prevent, detect and respond to breaches, says CISO Hussein Syed.
STOP THE BREACH: Reduce the Likelihood of an Attack Through an IAM Maturity Model.
Forrester estimates that 80% of security breaches involve privileged credentials.1
In December 2016, Centrify commissioned Forrester Consulting to evaluate identity and access management (IAM) practices and technology among large...
Who are the top cybercrime groups, and what security lessons can we derive from their latest attacks and attack vectors?
Download this interview to explore:
The evolution of cybercrime groups;
The latest attacks, including ransomware and account takeover;
Fox-IT's latest threat intelligence on who the...
The best starting point for effectively safeguarding data and protecting against breaches is to clearly understand what kind of data an organization has, where it's located and the risks, says Jason Hart of Gemalto.
As a veteran security practitioner, Sam Curry of Cybereason is tired of the attackers having the advantage. He wants to see the tables turned, and he believes behavioral analytics just might be the technology to make it happen.
In the age of ransomware and business email compromises, email security has taken on new significance. And Zix, the email security provider, has rebranded itself to respond. Dave Wagner, Zix CEO, discusses the latest threats and defenses.
The Healthcare Information and Management Systems Society's 2017 Conference will offer a slew of educational sessions and informative exhibits focused on top cybersecurity and data privacy challenges facing the healthcare sector. Catch our coverage.
In 2016, cyberattacks and cybersecurity (or a lack thereof) grabbed media attention on both the corporate and consumer sides, even becoming a key issue in the US presidential election. In this respect, you could say that everyone, even those who have never logged on, was affected by cyberattacks and hacking in...
This monthly Security Agenda will highlight some of the most recent additions to our course library. February's edition features Gartner analyst Avivah Litan discussing "Endpoint Detection and Behavioral Analytics." Other industry influencers like RSA's Principal Manager of Identity Protection, Angel Grant, Co-Founder...