Ransomware: An Epidemic for the Healthcare Industry?
Recent incidents at two urology clinics have left healthcare organizations seeking a cure for a threat that has plagued their industry for years: ransomware.
Congress on ISP Data: Money > Privacy
Congress kicked consumer privacy right in the teeth this week with the vote to allow broadband Internet providers to sell customers’ data without consent. The decision rolls back a key rule implemented just a few months ago by the FCC and sends a clear signal that in Washington, now more than ever, money talks.
Top 10 Biggest Healthcare Data Breaches of All Time
For years the healthcare industry has been a prime target for cybercriminals – here’s a recap of the biggest data breaches from healthcare companies.
What is the NIS Directive? Definition, Requirements, Penalties, Best Practices for Compliance, and More
Learn about the EU’s Directive on the security of network and information systems in Data Protection 101, our series on the fundamentals of information security.
What is Polymorphic Malware? A Definition and Best Practices for Defending Against Polymorphic Malware
Learn about polymorphic malware and how to protect against this threat in Data Protection 101, our series on the fundamentals of information security.
Offensive Active Defense: The Bad, the Worse, and the Outright Dangerous
There are bad ideas and then there are really, really bad ideas.
GDPR: Getting the Board on Board
As is the case with many cybersecurity projects, getting senior-level support for GDPR compliance efforts requires effective communication. Here are some tips for getting the board on board with GDPR.
What is NIST SP 800-53? (Definition & Compliance Tips)
Learn about the NIST SP 800-53, a critical component of FISMA compliance, in our Data Protection 101 series.
What CIA Hacking Says About Encryption
If you haven’t been following the news this week, you missed a major story. Wikileaks has revealed that CIA actively engages in espionage. And it uses computers to do so. But for most end users and encryption advocates, this news is good.
Advanced Threat Protection: Expert Tips for Protecting Your Organization Against Advanced Threats
26 security pros share the most effective approaches to advanced threat protection.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.