The search found 3759 results.
News
Experts share predictions and strategies for safeguarding the future from AI-driven attacks to post-quantum challenges.
Blog
There’s a trend of hackers being able to remain on an organization’s network for periods of time – without even being detected. Does this make you think about what measures you currently have in place to provide visibility of who is on your network, and what they are doing?
Blog
On May 12, President Biden signed an Executive Order aimed at improving the nation’s cybersecurity and protecting federal government networks. A White House statement highlighted recent cybersecurity attacks like SolarWinds, Microsoft Exchange, and the Colonial Pipeline as strong reminders of the threat the country’s public and private sectors face.
Blog
The fourth industrial revolution has arrived. Also called industry 4.0, this term refers to the rise of smart factories and how manufacturing as an industry is quickly transitioning from place-based warehouses to networks of global software, automated systems, OT, and integration of the internet of things to manufacture anything and everything in entirely new ways.
News
Cyberattacks target every industry all the time, and healthcare is no exception. According to a recent IBM study, the average cost per healthcare cyberattack is a hefty $7 million. Despite numbers like this, cybersecurity often isn’t the C-suite’s top priority. How can CISOs in hospitals and other healthcare organizations demonstrate the value of strong cybersecurity while a host of other issues vie for leadership’s attention?
News
Cybersecurity Leaders Urge Action as CISA 2015 Expiration Creates Gaps in Cyber Intelligence Sharing
Critical infrastructure industries are facing new uncertainty following the recent expiration of the Cybersecurity Information Sharing Act of 2015 (CISA 2015).
Blog
Cybersecurity leaders share perspectives on challenges and best practices surrounding patient data privacy and healthcare IoT devices. Read the blog.
News
If you worked in healthcare back in 2009, you surely have an opinion on the topic of meaningful use. You likely recall the blissful optimism the healthcare community had when the policy was first introduced—and the inevitable disruption and frustration that followed. Now, over a decade later, we're still cleaning up the cybersecurity mess that meaningful use created.
Blog
The word is already making the rounds in analyst meetings, white papers, and slide decks: cybersecurity mesh. Is it new software? Or a new attack vector? Or something else entirely? The fact is that cybersecurity mesh architecture is a concept all organizations need to be paying attention to and utilizing in their own cybersecurity strategies.
News
One of the most popular analyst terms in 2022, cybersecurity mesh is a defense method for securing each device and critical access points with their own security perimeter. It builds a foundation of dynamic interoperability in the environment, rather than the traditional security protections of a single perimeter.
Read the full article at MedCityNews.com