2015 Healthcare Information Security Today Survey

The ever-changing threat landscape requires more robust security risk management programs that can defend against the unknown. This survey assesses how healthcare entities are doing with regulatory compliance. But beyond that, it assesses progress toward taking other steps to strengthen overall security and privacy of health data, including preventing and detecting breaches. The survey was developed by the editorial staff of Information Security Media Group, with the assistance of members of the HealthcareInfoSecurity board of advisers, which includes leading healthcare information security and IT experts. Sponsors include: Caradigm; the International Information Systems Security Certification Consortium, better known as (ISC)2; and ZixCorp.

Spotlight

Silicium Security inc.

Founded in 1999, Silicium Security develops advanced computer security solutions for IT, Security and Incident Response professionals. We focus mainly on the development of behavioral malware detection systems for large Windows environments. Our flagship product, ECAT, is used by large organizations worldwide to assess the security of their environment and to quickly find the source of computer compromise. We also provide malware analysis support and training to users of our product.

OTHER WHITEPAPERS
news image

Managing the IT Modernization Elephant A bite-sized approach to digital modernization

whitePaper | June 15, 2022

There’s an old saying, “How do you eat an elephant? One bite at a time.” In some cases, the task of technology modernization is akin to eating an elephant. Government agencies are filled with legacy applications, many of which have been heavily customized over decades of operation.

Read More
news image

Darktrace Cyber AI Analyst: Autonomous Investigations

whitePaper | February 9, 2023

This white paper examines the technology and design principles behind Darktrace's Cyber AI Analyst, a groundbreaking innovation that automates threat investigations at speed and scale.

Read More
news image

Scenarios for the Future of Cybercrime - White Paper for Decision Makers

whitePaper | January 28, 2020

Project 2020 is an initiative of the International Cyber Security Protection Alliance (ICSPA). Its aim is to anticipate the future of cybercrime, enabling governments, businesses and citizens to prepare themselves for the challenges and opportunities of the coming decade. It comprises a range of activities, including common threat reporting, scenario exercises, policy guidance and capacity building.

Read More
news image

Secure by Design: Lexmark Print Devices

whitePaper | October 27, 2022

As organizations enhance the security of their infrastructure and move towards security methodologies and strategies, such as, Secure Access Service Edge (SASE), defense in depth, assume breach, and zero trust to provide tighter access controls, the print infrastructure must also adapt. It must become a strategic initiative to secure the print infrastructure and consider both internal and external threats. Data has become a cornerstone for innovation and has become a company's most valuable asset. Some of the challenges that companies face are inadequate security practices and too much data to manage. It is important to remember that security is not a solo sport, and as a community, we are stronger together.

Read More
news image

2022 Trends in Securing Digital Identities

whitePaper | August 22, 2022

Managing the ecosystem of identities accessing enterprise resources has only gotten more complicated during the past several years. Between the increasing number of identities, the challenges posed by phishing attacks, and the continued growth of cloud adoption, enterprises are under pressure to ensure the army of remote workers, contractors, and employees accessing network resources are doing so securely and successfully.

Read More
news image

PROMOTING BETTER CYBERSECURITY

whitePaper | December 18, 2019

The Ohio Data Protection Act (“ODPA” or the Act), came into force on November 2, 2018.1 The Act seeks to improve cybersecurity among Ohio businesses. It does so by providing an affirmative defense against tort claims arising from a data breach to businesses that can demonstrate they have implemented a qualifying cybersecurity program that reasonably conforms to one of ten specified cybersecurity frameworks and met certain other safeguards specified in the Act.

Read More

Spotlight

Silicium Security inc.

Founded in 1999, Silicium Security develops advanced computer security solutions for IT, Security and Incident Response professionals. We focus mainly on the development of behavioral malware detection systems for large Windows environments. Our flagship product, ECAT, is used by large organizations worldwide to assess the security of their environment and to quickly find the source of computer compromise. We also provide malware analysis support and training to users of our product.

Events