The high-profile breaches of Fortune 100 companies are the ones that get the headlines, but small and midsized businesses should not breathe any sighs of relief. They are very much still targets, says Austin Murphy of CrowdStrike. He offers cybersecurity advice to SMBs.
Download this thought-leadership whitepaper...
At its core, HIPAA compliance is simply about maintaining patient privacy by ensuring the appropriate access to and use of patient data by your users. Electronic Health Record (EHR) solutions provide detail around when patient data is accessed, but without visibility into what users do with sensitive patient data...
The high-profile breaches of Fortune 100 companies are the ones that get the headlines, but small and midsized businesses should not breathe any sighs of relief. They are very much still targets, says Austin Murphy of CrowdStrike. He offers cybersecurity advice to SMBs.
Government cyber teams must adopt a modern and evolving security operations model and an analytics-driven approach to cybersecurity if they hope to keep pace with the evolving threat landscape.
The 2018 CrowdStrike® Global Threat Report offers one of the industry's most comprehensive reports on today's most damaging cyberattacks and dangerous adversaries. It contains valuable insights into the evolving threat landscape and includes recommendations that will help you be better prepared for the security...
The Future Is Here; Go With It
Industry analysts see a major shift to software-defined storage (SDS), with SDS overtaking conventional storage by 2020. Container-based or container-native storage (CNS) is a big part of that move. Government agencies and organizations are better off accepting and adopting the...
CynergisTek's 2018 report aggregated ratings from security assessments performed at hundreds of healthcare organizations in 2017 to reveal an average 45% conformance with NIST Cybersecurity Framework (NIST CSF). The report found that of the NIST CSF five Core Elements, organizations had the lowest ratings in detecting...
Governing cyber risk does not have to feel like crossing a minefield. In this webinar, Andy Norton of Lastline provides insight into the simple traps that organizations fall into, how to correctly estimate the probability of a data breach and how to ensure appropriate remediation if a threat takes place.
Andy will...
With the advent of technology in personal healthcare - internet connected glucose monitors, intravenous blood pressure monitoring, personal best friend emotional bots - a lot of highly sensitive data that's rampantly traversing the airwaves. The impact of this data getting in the wrong hands is just starting to be...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Christiana Care's Anahi Santiago on 2018 risk management priorities. Another influencer, Lewin and Associates' Dr. Jack Lewin discusses the latest medical device security threats. This...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Aetna's Jim Routh on the benefits of 'unconventional controls.' Another influencer, Phil Reitinger of the Global Cyber Alliance discusses email and credential security and how DMARC can...
Ransomware is not a new type of threat: it's been around in its current form for over a decade. However, in the last few years, it has risen to prominence as an increasing number of variants were released into the wild - and several high-profile organisations fell victim to them.
While the number of ransomware...
If you want to anticipate a prospective hacker's moves, then you'd better be able to think like one. Whether corporations like it or not, they're actually being tested by cyber criminals as we speak.
Download this whitepaper on ethical hacking and learn:
The definition of then term "cyologist";
Why we need to...
A recently published 2017 survey of over 400 security professionals in the U.S., U.K. and Germany measured how well their organizations implemented security controls for SSH keys. The results show that most organizations are underprepared to protect against SSH-based attacks, with fewer than half following industry...
SSH keys provide the highest level of access rights and privileges for servers, applications and virtual instances. Cyber criminals want this trusted status and invest considerable resources into acquiring and using SSH keys in their attacks.
Even though SSH keys are the credentials that provide the most privileged...