As the HIPAA security rule turns 20, it's time for regulators to make updates reflecting the changing cyberthreat landscape and technological evolution that's happened over the past two decades, says security expert Tom Walsh.
Real-world incidents prove over and over again that many of the most widespread issues still stem from a lack of basic cyber hygiene. This report looks at where organizations are falling on the basics and outlines steps for establishing a strong foundation for security.
Download this industry-leading report to...
Securing the public cloud is not as challenging as it used to be, but too many organizations are still taking the wrong approach, says Microsoft's Jonathan Trull. Understanding the shared responsibility model for security is critical, he says.
What the world needs now is Integrity
Established as part of the CIA triad, Integrity's certainly not new cybersecurity vocabulary. But it's the least understood. Integrity is about maintaining a desired state. File Integrity Monitoring (FIM) is the clearest example, but it's important to extend Integrity more...
With the rise in popularity of containers, development and DevOps paradigms are experiencing a massive shift. You may be struggling to figure out how to secure this new class of assets and the environments they reside in.
Download this comprehensive whitepaper for guidance on:
How to think beyond securing just...
Cloud-based CRM giant Salesforce.com is warning some of its Marketing Cloud users that any data they stored may have been accessed by third parties or inadvertently corrupted because of an API error that persisted for six weeks.
Web application firewalls (WAF) are a basic security necessity for every
organization. Oracle Dyn WAF covers all of your bases and more with this
cloud-based, advanced solution.
Factors such as the rise of cloud computing, use of open
source technologies, the increase in data processing requirements,...
Security leaders have been addressing the global skills gap for over a decade, with little to show for it.
However, a new approach - leveraging software as a service - is making up for the staffing shortfall.
The discussion really starts with software as a service. If you look at the benefits of leveraging the cloud...
Why are attacks so successful? Legacy endpoint security products are creating more problems than they solve. There is too much cost and complexity, defenses aren't keeping up, and security staff is stretched thin.
Silicon Valley employees are increasingly calling on executives to restrict the use of facial recognition technology, mobilized in part by the U.S. government's previous policy of separating children from parents at the border. Experts say facial recognition regulations are needed - and quickly.
Businesses undertaking digital transformation - typically involving a push to the cloud, amongst other initiatives - must put security first if they want their project to achieve optimum success, says Fortinet's Patrick Grillo.
The cloud is a notable business advantage, but it does bring numerous security concerns including: a lack of visibility across cloud or between on-premises and cloud environments, monitoring security controls and changes within cloud and multi-cloud environments, and maintaining compliance by monitoring cloud traffic...
Just one click: That's all it takes for a victim to inadvertently grant attackers access to their email account via a third-party application. Here's how to spot signs of OAuth-related hacking and how to defend against it.
Recent failures of IT systems at some major airports and banks are a reminder that as an organization launches a digital transformation project, or seeks to move more of its processes to the cloud, those efforts won't necessarily proceed smoothly or securely, says Skybox Security's Justin Coker.
Cyberattacks and damages due to business email being breached dramatically increased again this past year. The FBI estimates $5 billion in losses worldwide as email continues to be a primary attack vector for the initial compromise.
As organizations move their email infrastructure to cloud solutions like Office...