Enterprise Security

Recommended Criteria for Cybersecurity Labeling of Consumer Software

February 4, 2022

nvlpubs
Software is an integral part of life for the modern consumer. Nevertheless, most consumers take for granted and are unaware of the software upon which many products and services rely. From the consumer’s perspective, the very notion of what constitutes software may even be unclear. While enabling many benefits to consumers, that software that is, software normally used for personal, family, or household purposes can also have cybersecurity flaws or vulnerabilities which can directly affect safety, property, and productivity.

Spotlight

CynergisTek, Inc

CynergisTek is a top-ranked cybersecurity firm dedicated to serving the information assurance needs of the healthcare industry. CynergisTek offers specialized services and solutions to help organizations achieve privacy, security, compliance, and document output goals. Since 2004, the company has served as a partner to hundreds of healthcare organizations and is dedicated to supporting and educating the industry by contributing to relevant industry associations. The company has been recognized by KLAS in the 2016 and 2018 Cybersecurity reports as a top performing firm in healthcare cybersecurity as well as the 2017 Best in KLAS winner for Cybersecurity Advisory Services.

OTHER WHITEPAPERS
news image

2022 Trends in Securing Digital Identities

whitePaper | August 22, 2022

Managing the ecosystem of identities accessing enterprise resources has only gotten more complicated during the past several years. Between the increasing number of identities, the challenges posed by phishing attacks, and the continued growth of cloud adoption, enterprises are under pressure to ensure the army of remote workers, contractors, and employees accessing network resources are doing so securely and successfully.

Read More
news image

Leading Cybersecurity in Higher Education

whitePaper | February 11, 2023

Higher-education institutions are experiencing a high volume of cyberattacks and greater vulnerability to threats. Today’s educational technology environments connect a variety of endpoints—laptops, desktops, student management data, and email servers. They use Internet-of-Things (IoT) devices for managing environmental controls, security cameras, and door alarms. Both ends of the education spectrum gather, store, and use personal data from students and staff—and if they collect it, they must also protect it. As a result, schools need dedicated, skilled, and experienced executive leadership that is empowered, resourced, and responsible for campuswide cybersecurity issues.

Read More
news image

Consumer IoT Device Cybersecurity Standards, Policies, and Certification Schemes

whitePaper | February 16, 2023

There are three key elements in the world of Internet of Things cyber security. Standards are created in order to harmonize a common set of requirements. Regulations are created in order to incentivize manufacturers to adopt cybersecurity hygiene practices so as to protect societies and increase their cyber-resilience. Labels are created in order to provide visibility to consumers.

Read More
news image

Exadata Database Service on Cloud@Customer Security Controls

whitePaper | July 11, 2023

This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. Your access to and use of this confidential material is subject to the terms and conditions of your Oracle software license and service agreement, which has been executed and with which you agree to comply. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates.

Read More
news image

The State of Zero Trust Security 2022

whitePaper | September 27, 2022

The philosophy of Zero Trust security—“never trust; always verify”—has certainly struck a chord. It took decades for organizations to move past the basic castle andmoat security mindset, and to accept that in a cloud world, there is no perimeter to defend, and intruders are always on our networks.

Read More
news image

C2 Password Security White Paper

whitePaper | November 24, 2022

In recent years, the necessity to create and maintain dozens or hundreds of online accounts with logins and passwords has become more and more prominent, especially with remote work on the rise and internet usage at an all-time high. Nothing is more secure than making sure that every one of your accounts that you create is using a unique or randomly generated password, but where do you keep track of all of these passwords, and how can you ensure that your password security is up to par?

Read More

Spotlight

CynergisTek, Inc

CynergisTek is a top-ranked cybersecurity firm dedicated to serving the information assurance needs of the healthcare industry. CynergisTek offers specialized services and solutions to help organizations achieve privacy, security, compliance, and document output goals. Since 2004, the company has served as a partner to hundreds of healthcare organizations and is dedicated to supporting and educating the industry by contributing to relevant industry associations. The company has been recognized by KLAS in the 2016 and 2018 Cybersecurity reports as a top performing firm in healthcare cybersecurity as well as the 2017 Best in KLAS winner for Cybersecurity Advisory Services.

Events