Please turn on your JavaScript for this page to function normally.
Listen to your employees or deal with shadow IT

Data leakage, compliance breaches, business inefficiency and hidden costs are just some of the risks organizations are leaving themselves open to by not meeting the IT demands …

When it comes to patient data privacy, compliance and security differ

If a name perfectly underscored a growing issue of concern, it’s Anthem. In February, the health insurance plan provider disclosed cyber attackers had breached its IT …

Protecting healthcare records from cyber attacks is a game of cat and mouse

The never-ending battle between healthcare organisations and cyber attackers has always been like a game of cat and mouse. The hacker plays the role of the mouse, constantly …

Smartwatches and corporate data

I was super excited when my wife got me a smartwatch. In addition to the geeky coolness factor of a smartwatch, being a long-time security professional I was also interested …

Hack yourself first: How we can take the fight to the black hats

The Internet has increased the interconnectivity of everyone and everything on the globe. From healthcare to commerce, public services and beyond, being connected has enriched …

A few small steps for man, a giant leap for online security

The online world is vast. Just follow these straightforward tips, which will make it harder for hackers, and keep you secure. Open wireless access points As you take a seat on …

Expert tips to address third party security risks

Risks to sensitive data have never been greater. With the rise in cyber attacks and data breaches, outsourcing to third parties can present an exponential threat to …

What security tools do healthcare organizations lack?

The Health Information Trust Alliance (HITRUST) has completed a three-month review of its approach to cyber risk management for the healthcare industry. The effort was focused …

5 tips to avoid identity theft

“Tax fraud is widespread and happening as you read this,” says security and identity theft expert for Credit Sesame, Neal O’Farrell. “In the first week …

3 ways to advocate for data security at your company

There’s an unfortunate tendency among many businesses to rank data security well below other functions. It’s a familiar story: firms slash resources at the first …

Security framework for governments deploying the cloud

ENISA released a framework structured into four phases, nine security activities and fourteen steps that details the set of actions Member States should follow to define and …

Black hole routing: Not a silver bullet for DDoS protection

As ISPs, hosting providers and online enterprises around the world continue suffering the effects of DDoS attacks, often the discussions that follow are, “What is the …

Don't miss

Cybersecurity news