With just a few months left until the EU's General Data Protection Regulation will be enforced, too many so-called "experts" are spreading fear and falsehoods about the regulation, says Brian Honan, a Dublin-based cybersecurity consultant, who clarifies misperceptions in an in-depth interview.
The latest ISMG Security Report features a special report on securing medical devices. Healthcare security leaders from the FDA, an academic medical center and a medical device manufacturer share their insights on the challenges involved.
2016 was a year where more was more in the security world. The implications of the unprecedented leaks of comprehensive data sets, from political to intellectual property concerns, will have major impacts on the security landscape for years to come.
Download this whitepaper and learn:
Why classic attack vectors...
Are unpatched vulnerabilities leaving you at risk?
At the rate of almost half of all attack types, hackers are using injection attacks to take advantage of vulnerabilities in operating systems and applications to penetrate networks and databases.
Download this whitepaper and learn:
How attackers are using...
With both money and personal information at stake, financial services organizations continue to be a magnet for cybercrime.
Download this whitepaper and learn about:
Notable attacks against financial institutions in 2016;
Prevalent methods of attack utulized by cybercriminals;
Best practices for banks to...
If you want to anticipate a prospective hacker's moves, then you'd better be able to think like one. That's the position of Terry Cutler, an ethical hacker who dedicates his time to testing organization's cybersecurity defenses - and their people.
U.S. government agencies now find themselves having to comply with Binding Operational Directive 18-01 to enhance email and web security. But what are the immediate tasks for agencies to undertake?
Download this eBook on enhancing email and web security and learn about:
The toughest compliance task facing...
We all see the headlines about high-profile breaches that started because of a phishing exploit. But how severe is the global email infiltration problem?
90 percent of data breaches investigated by the secret service, law enforcement, and forensic companies start from an email infiltration, according to the the...
The global cybersecurity skills shortage is real, and it's deeply impacting organizations' abilities to implement and manage new technology tools. But worse, it's also affecting how organizations assess their adversaries.
What does the security team need to do? What requires protecting in the business? Where is it,...
As data protection breaches have become daily headline news and everyone becomes increasingly sensitive about privacy, the regulatory regime is getting tougher. Data protection laws in Europe are more important than ever before - especially as the enforcement deadline of the EU GDPR looms.
How can a financial institution spot a true customer from an impostor in the digital world? Cybercriminals leave footprints for fraud experts that are markedly different than true customers.
Download this whitepaper and learn about fraud clues such as:
The use of a pre-paid SIM card;
Automated or industrial...
Join this webinar to learn about the new Directive on Payment Services (PSD2), and the impact it has on European banks and financial service providers. This new regulation is expected to change the way we interact and consume digital banking.
Are you going to check the box? Or are you going to leverage the...
Every new cybersecurity regulation includes at least some emphasis on improving vendor risk management. But what happens when vendors balk at the extra degree of scrutiny required? Moffitt Cancer Center's Dave Summitt describes his risk-based approach to business associates.
As the GDPR's enforcement date nears, North American healthcare organizations are scrambling to ensure their data protection policies and practices are up to snuff. Mitch Parker of Indiana University Health System offers his prescription for GDPR compliance.