Following the success of Russian offensive cyber operations, other countries will likely be testing their capabilities, says FireEye's Bryce Boland, who predicts nation-state attacks will become more common in 2018.
Ira "Gus" Hunt, a security expert who was formerly CTO at the CIA, analyzes why many large healthcare provider organizations plan to boost cybersecurity spending in 2018 and discusses the role of emerging technologies.
In the Face of Advanced Threats, is Your Organization's Security Posture Reactive or Proactive?
Today's most advanced threat actors - whether external or internal - are stealthier than ever and able to hide within one's systems for days, weeks or even months as they gather intel and prepare to strike. Sixty-one...
The U.S. Food and Drug Administration issued cybersecurity expectations for manufacturers of medical devices. But ow are those expectations being met, and what is the FDA's ongoing role in improving device security? The FDA's Suzanne Schwartz offers an update.
It's been seven years since Dale Nordenberg, a pediatrician, became involved in the drive to improve medical device security. What progress does he see among manufacturers, government agencies and healthcare providers?
Curt Kwak, CIO of Proliance Surgeons, a large Washington state surgery practice, discusses top security challenges and priorities for the new year in this in-depth interview.
Exploring Samuel Visner's vision - patterned after the Manhattan Project and moonshot - for collaborating to create innovative ways to improve cybersecurity leads the latest edition of the ISMG Security Report. Also featured: a report on legislation designed to improve the security of U.S. elections.
While working to maintain tactical control of the mobile environment, IT managers often find themselves drowning in minutiae. Overwhelmed by the number of moving parts, they're unable to stay abreast of the latest threats, let alone extract meaning from or make decisions based on the mountains of data now being...
Few organizations can standardize on one or two types of devices that all run the same OS, especially if they have a BYOD policy in place. Users now demand extraordinary flexibility, and organizations that can accommodate these user preferences can see dramatic increases in employee productivity.
Download this...
Forrester evaluated how enterprises are managing and securing endpoints and how strategies will change over the next three years. An in-depth survey of 556 IT and security leaders found that while enterprises have a decentralized approach to managing and securing smartphones, tablets, laptops, and IoT today, they will...
To better address security issues, companies in the manufacturing industry need to ensure proper communications between their operational technology and information technology specialists, says RaviKiran Avvaru, head of IT at Toyota Kirloskar.
Two London-based Romanians recently arrested in Bucharest as part of a roundup of alleged ransomware attackers have been accused of hacking into Washington surveillance cameras and using them as a launchpad for Cerber and Dharma ransomware attacks.
An assessment on whether North Korea is behind the WannaCry ransomware attacks leads the latest edition of the ISMG Security Report. Also, the co-author of NIST's revised Trustworthy Email special publication discusses changes in the guidance.
This eBook introduces IT professionals to next-generation multi-factor authentication (MFA), an approach to authentication that goes well beyond usernames and passwords to provide the right level of security assurance at the right time, anytime. Next-generation MFA also streamlines authentication while empowering...
South Korean police investigating the hack of a cryptocurrency exchange are eyeing North Korean hackers as the likely culprits. North Korea has also been tied to recent phishing campaigns and other attacks, including what appears to be the first case of nation-state malware designed to infect point-of-sale devices.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.