The healthcare industry (hospitals in particular) is one of the top industries targeted for cybercrime. Given the high value of a stolen healthcare record, motivated adversaries will continue to go where the money is.
Download this guide and learn:
The three most common DLP use cases in healthcare systems;
The HITRUST Cyber Threat Xchange played a role in making U.S. healthcare organizations aware of the worldwide WannaCry ransomware campaign early enough to help them thwart the threat, says HITRUST's Elie Nasrallah.
Email, which is too easily spoofed, phished or taken over, remains a leading cybersecurity risk. But finally, after years of pushing, the Domain-based Message Authentication, Reporting and Conformance standard, or DMARC is helping to bolster email security, says Phil Reitinger, CEO of the Global Cyber Alliance.
Adoption of the Domain-based Message Authentication, Reporting & Conformance - or DMARC - standard is very low in the healthcare sector, and broader use could greatly reduce phishing risks, according to a new study.
The global cybersecurity skills shortage is real, and it's deeply impacting organizations' abilities to implement and manage new technology tools. But worse, it's also affecting how organizations assess their adversaries.
What does the security team need to do? What requires protecting in the business? Where is it,...
Careful cyber security incident response planning provides a formal, coordinated approach for responding to security incidents affecting information assets. This e-book provides easy-to-follow steps for crafting an incident response plan in the event of cyber security attacks.
Download this eBook and you will learn...
Your security team should proactively and regularly hunt for cyber threats in order to stay on top of the ever evolving cyber threat landscape. If you are a CISO, information security manager, or security analyst, this eBook is a practical guide to help you understand how to set up your own threat hunting...
The latest ISMG Security Reports leads with a top DHS cybersecurity leader, Jeanette Manfra, providing a case study on how information sharing helped mitigate the WannaCry attack in the U.S. Also, the SEC mulls toughening its cyber risk reporting requirements.
In the past decade, financial institutions have undergone a significant digital transformation - delivering new levels of customer convenience and services through online and mobile channels. However, this represents just the beginning of an even greater change.
Read this white paper to learn more about...
Modern enterprises are doing their best to address three simultaneous and closely interrelated objectives related to their information technology infrastructure: to be secure, compliant, and well-managed.
Download this whitepaper and learn about creating:
Integration of data relevant to security, compliance, and...
Former Trump campaign aide George Papadopoulos learned that Russia had thousands of pilfered emails containing "dirt" on Hillary Clinton three months before they appeared online, according to court documents.
An in-depth look at the DMARC anti-spoofing system - which the U.S. Department of Homeland Security this past week said it will require federal agencies to adopt - leads the latest edition of the ISMG Security Report. Also, continuous monitoring of the insider threat.
A new directive from the U.S. Department of Homeland Security elevates federal agencies' email security to the DMARC standard that's widely adopted by commercial email providers, including Google, Yahoo and Microsoft.
The HITRUST Cyber Threat XChange (CTX) is sharing bi-directional indicators with the Department of Homeland Security. HITRUST's Cyber Lab, in partnership with Trend Micro, identified malicious indicators of compromise several weeks in advance of the WannaCry outbreak. CTX members were able to automatically receive...
Two Russian hackers, members of a group called "Shaltay-Boltai" - Humpty Dumpty in Russian - that stole and sold high-level Russian officials' emails, have been sentenced to serve three years in prison. The case against them may tie to a high-profile Russian treason investigation.