RSA Conference Asia Pacific and Japan, which wrapped up last week, was a successful reflection of this region's hottest security topics. Here are some of my own observations, as well as feedback from the attendees.
Tools to build and manage the ZeusVM banking Trojan have been leaked online, meaning that both die-hard and would-be criminals alike can now try their hand at running botnets, for free.
Big data analytics may be new to some healthcare organizations, but there are plenty of lessons to be learned from successful deployments. Rick Gamache of Red Sky Alliance shares some of these key lessons.
Wipro has developed a fraud detection model for improved risk management using big data analytics. Can CISOs leverage it to reduce risk, enhance process efficiency and refine fraud detection algorithms?
During a time of significant change for corporations, when today's modern network extends far beyond the company's physical walls, it's disturbing that companies face such well-organized and pervasive threats.
In the wake of recent alerts about infusion pump security vulnerabilities, now's a good time for all healthcare organizations to reassess their basic practices for keeping medical devices secure and safe. Check out what the VA is doing.
Wanted: Hackers for hire. Or in British government parlance: "Committed and responsible individuals who have the potential to carry out computer network operations to keep the U.K. safe." Ready to apply?
Leaders and top practitioners from numerous federal government agencies will transplant themselves to San Francisco this coming week to share their knowledge on a wide range of topics at RSA Conference 2015.
Most organizations have yet to realize the cybersecurity benefits of big data analytics, says Russell Thomas of Zions Bank. He explains steps the pioneering bank is taking to revolutionize its big data operations.
The proposed rules for Stage 3 of the HITECH Act "meaningful use" electronic health record incentive program come up short on privacy and security. But regulators have time to fix that.
While cyberthreats are rising, budgets for information security are not for many of the respondents to our 2015 Healthcare Information Security Today survey. The VA, however, is spelling out plans to boost security spending.
Still going strong after six years, nullcon is witnessing increased participation and community recognition, without diluting its focus. Here are insights and takeaways from this year's event.
Cybersecurity has been a priority of the Obama presidency from the get-go. But do all of his cybersecurity actions, unprecedented among American presidents, make him a cybersecurity leader?
Healthcare organizations and their business associates need to make three important resolutions in 2015 to better safeguard patient data and avoid the enforcement wrath of regulators.
A massive international operation has resulted in the arrest of 118 people suspected of using stolen card data to buy airline tickets, or using fake tickets, thanks to big data capabilities for combating crime.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.