Breach Control: Best Practices in Health Care Application Security

Data breaches in the health care industry have surged in the past few years. The health care industry is currently the largest attack surface of the critical infrastructure. Among all of America’s critical infrastructures, the health care sector is the most targeted and is plagued by perpetual persistent attacks from numerous unknown malicious hackers, intent on exploiting vulnerabilities in insecure and antiquated networks in order to exfiltrate patient health records (ICIT, 2016).Medical identity theft continues to rise and is predicted to worsen in 2016. Medical identity theft occurs when personally identifiable information (PII) is used by someone else for health care, health coverage, disability benefits, financial fraud and more.Recently the U.S. Senate Committee on Health, Education, Labor and Pensions (HELP) pressured the Department of Health and Human Services (HHS) in a 10 November 2015 letter to gain information on how the HHS intends to protect the integrity of health care data in spite of the growing alarm that the health care industry is ripe for more data breaches (United States Senate, 2015).

Spotlight

CNS Middle East

CNS Middle East has over 30 years of successful achievements and long-term partnerships with distinct customers across the region. Being a pillar in the technology industry and innovation, CNS provides integrated solutions for all customer vertical needs and digital transformations. CNS covers three main pillars of the IT industry: Banking & Financial Service Insurance (BFSI), Technology & Innovation Partner (TIP), and IT Outsourcing services (ITO).

OTHER WHITEPAPERS
news image

Mid-Year Threat Landscape Report

whitePaper | November 17, 2019

The first half of 2019 brought interesting developments in malware targeting popular operating systems, in hardware and software vulnerabilities affecting consumer and businesses, and in the increased number of attacks aimed at (and even carried out by) IoTs. With the money motive driving the proliferation of malware, cybercriminals are nothing if not resourceful when developing new malware strands or coming up with more successful attack vectors. The number of malware samples roaming the internet is about to reach the 1 billion1 milestone.

Read More
news image

Application Security in a Multi-Cloud World

whitePaper | October 18, 2022

In the mad dash to the cloud, organizations have turned their application environments into a miscellaneous mess. Whether it be private, public or on-premise, organizations are leveraging heterogenous application hosting environments as they transition to the next phase of cloud computing: The multi-cloud.

Read More
news image

MEC security; Status of standards support and future evolutions

whitePaper | September 28, 2022

The present White Paper will focus on MEC (Multi-access Edge Computing) technologies and intends to explore security-related use cases and requirements with the aim of identifying aspects of security where the nature of edge computing results in insufficient industry approaches to cloud security. Edge computing environments are by nature characterized by a complex multi-vendor, multi-supplier, multi-stakeholder ecosystem of equipment including both HW and SW devices. Given this overall level of system heterogeneity, the areas of security, trust, and privacy are key topics for the edge environments. Finally, the advent of edge cloud federations and the presence of (far) edge devices, e.g., in Internet-ofThings environments, requires tackling MEC security with an end-to-end (E2E) approach by leveraging existing standards relevant in the area, as carefully selected to be applicable in edge computing systems.

Read More
news image

What Is a Value Chain for Security

whitePaper | November 15, 2019

Cisco has architected and deploys a capability that continually assesses, monitors, and improves the security of our value chain throughout the entire lifecycle of our solutions.

Read More
news image

Security Operations Maturity Model

whitePaper | February 20, 2020

As the threat landscape continues to evolve, your cybersecurity efforts must follow suit. With your security operations center (SOC) at the core of your offense against threats, you must ensure that it can handle anything that comes its way. To be effective, you need to mature your SOC to stop threats early — before damage occurs. Whether your SOC is a virtual team of two to three or a 24x7 operation, maturing your security operations capabilities will help you achieve a faster mean time to detect (MTTD) and mean time to respond (MTTR) to cyberthreats. This white paper explores LogRhythm’s Security Operations Maturity Model (SOMM), which explains how to measure the effectiveness of your security operations. Through the model, you can learn how to mature your security operations capabilities, improving your resilience to cyberthreats.

Read More
news image

GE Gas Power Cybersecurity Portal

whitePaper | October 31, 2022

GE Gas Power has developed a product security program based on industry-leading standards, encompassing end-toend cybersecurity through the entire software development lifecycle in conjunction with engineering, sourcing, and vulnerability and incident response. As part of this program, we have also created the Gas Power Cybersecurity Portal, a central, publicly available resource regarding cybersecurity at GE Gas Power.

Read More

Spotlight

CNS Middle East

CNS Middle East has over 30 years of successful achievements and long-term partnerships with distinct customers across the region. Being a pillar in the technology industry and innovation, CNS provides integrated solutions for all customer vertical needs and digital transformations. CNS covers three main pillars of the IT industry: Banking & Financial Service Insurance (BFSI), Technology & Innovation Partner (TIP), and IT Outsourcing services (ITO).

Events