The RSA cybersecurity conference once again this year gathered tens of thousands of individuals to network and attend keynotes and briefings on topics ranging from election security and genomics to privacy and cybercrime. Here are 20 visual highlights from this year's event.
Very few healthcare Infosec teams have the time and resources to deal with the formidable security challenges that they face.
Join Gigamon and register for this webinar to learn ways to save time and resources while improving your security posture by:
Optimizing tool and team efficiency by filtering out irrelevant...
A home healthcare company has filed 17 breach reports after a ransomware attack on its cloud-based electronic health records vendor last December, illustrating once again how a vendor breach can have a wide impact.
Percona is an industry leader in providing best-of-breed enterprise-grade support, consulting, managed services, training and software for MySQL, MariaDB, MongoDB, PostgreSQL and other open source databases in on-premises and cloud environments. After noticing gaps across their third-party security and privacy...
Provident Finanial Group is a FTSE 250 company, and - with 5,700 employees serving 2.4 million customers - Provident understands the strong expectation to work with thirdparties who respect their customer and employee information. New frameworks such as GDPR, recent data breaches, and increased customer expectations...
Hacked-off patients are suing New Jersey healthcare organization Hackensack Meridian Health for damages after it suffered a ransomware attack last December and paid attackers an unspecified ransom to unlock its systems.
You already have some sort of third party security program in place - perhaps you've built a security questionnaire based on internal policies or an industry standard such as ISO or NIST. You may have even "right-sized" your questionnaire specifically for different types of supplier relationships and developed a few...
The National Institute of Standards and Technology has unveiled a pair of draft practice guidelines that offer updated advice and best practices on how to protect the confidentiality, integrity and availability of data in light of increasing threats from ransomware and other large-scale cyber events.
A federal judge has ruled that an insurer providing a "business owner's insurance policy" to a company that sustained a ransomware attack and was forced to replace most of its IT infrastructure must pay for the damages the security incident caused.
The financial and legal penalties that could result from noncompliance make it imperative to invest in transforming outdated GRC processes.
Through continuous monitoring and automation you can improve decision making, increase performance across your organization, and respond to business risks in real-time.
Maryland lawmakers are considering a bill that would make possession of ransomware a crime punishable by up to 10 years in prison, similar to moves at least two other states have already made. But is such legislation effective?
A lawsuit filed against DCH Health System in the wake of a ransomware attack that disrupted medical services for several days alleges that the Alabama-based organization failed "to properly maintain and safeguard its computer systems and data."
The Maze gang crypto-locked Georgia cable and wire manufacturer Southwire's systems and publicly dumped stolen data to try to force it to pay a ransom. In response, Southwire has sued its attackers and obtained a court order in Ireland that knocks the gang's "name and shame" site offline.