Data Protection May 6, 2019 High Stakes, Rising Risks: The Ripple Effects of Cybersecurity in the Healthcare Sector 5 min read - Is providing effective cybersecurity for the healthcare sector an IT problem or a wider-scope issue? The short answer is that it's both.
April 23, 2019 New DLL CryptoMix Ransomware Reportedly Using Remote Desktop Services for Installation 2 min read - Security researchers discovered that a new DLL CryptoMix ransomware variant is reportedly using Windows Remote Desktop Services (RDS) to install itself on unsuspecting users' machines.
Data Protection April 22, 2019 What’s the Best Way to Build Digital Trust? Show Your Customers You Care About Their Data Privacy 4 min read - Focusing on data privacy can have major benefits, including enhanced security, improved compliance and business growth — not to mention increased digital trust among your customer base.
CISO April 5, 2019 Preparing for the CCPA: Leverage GDPR Investments to Accelerate Readiness 5 min read - To prepare for the CCPA and other upcoming data privacy regulations, start by applying the best practices and frameworks you used to achieve GDPR readiness when the regulation took effect last May.
Incident Response March 26, 2019 When It Comes to Incident Response, Failing to Plan Means Planning to Fail 3 min read - In today's treacherous threat landscape, it seems the odds are overwhelmingly stacked against cyberdefenders. But there is one advantage attackers can't take away: thorough incident response planning.
Application Security March 5, 2019 Blockchain: Making the Reward Much Greater Than the Risk 5 min read - The decentralized nature of blockchain, coupled with consensus protocols, helps to address some security needs, but the consequences can be dire if security isn't fully explored.
Software Vulnerabilities March 4, 2019 Stranger Danger: X-Force Red Finds 19 Vulnerabilities in Visitor Management Systems 4 min read - Two X-Force Red interns discovered 19 previously undisclosed vulnerabilities across five popular visitor management systems that could enable attackers to establish a foothold on corporate networks.
Data Protection February 19, 2019 Lessons from the Encryption Front Line: Core Components in the Cloud 3 min read - Depending on your needs, you can develop encryption solutions based on open standards from components you build and run yourself or source them as managed services from cloud providers.
February 14, 2019 Catastrophe, Not Compromise: VFEmail Attack Destroys Decades of Data 2 min read - The email provider VFEmail suffered a "catastrophic" hack that destroyed the company's primary and backup data servers in the U.S.
CISO February 14, 2019 Why You Need a Security-First Culture to Deliver on Your Customer-First Goals 4 min read - Organizations that do not establish a security-first culture will struggle to deliver on their customer-first initiatives.