According to a Threat Landscape Trends report for Q2 2020, cryptojacking saw a 163% increase in detections, compared to previous quarters. 35% of organizations indicated in a survey by NinjaRMM, that ransomware attacks resulted in up to $5 million in damages. Similarly we see an explosion in DDoS attacks. In times...
Myths and misconceptions about software supply chain risk are incredibly common. They undermine software
development and put companies at risk.
This whitepaper reviews the four common myths, why they are untrue, and how you can inoculate your organization against risk.
Portals can benefit both patients and medical providers tremendously. But simply rolling out a portal
isn’t enough. Among other things, medical providers need to consider patient user experience, how to
keep PHI safe, scaling to meet peak portal demand periods, and how they will continue to innovate
Getting clinicians and staff up to speed in a merger or acquisition is critical to its success. With Okta
Single Sign-On, users can access all their applications with one username, one password, and one
session. The Okta dashboard is a quick and easy way for users to identify which apps to access and
when. This may...
If cloud apps are the future of healthcare, the future is here. Cloud identity is the foundation healthcare
organizations need as they adopt more cloud apps. CIOs need a secure, scalable, reliable, and unified
approach to successfully manage the cloud app explosion.
Healthcare organizations are increasingly...
The average amount of time that online attackers camp out in a victim's network - or "dwell time" - has been declining, FireEye's Mandiant incident response group reports. But the surge in ransomware accounts for some attacks coming to light more quickly because those attackers announce their presence.
Cyber attacks like the recent SolarWinds breach demonstrate how cybercrime is shifting focus to cloud services. At the same time, Gartner predicts that almost half of companies will shift their cloud and network security to a SASE architecture (Secure Access Service Edge) in the next few years. But is this the right...
“Work from anywhere” is a game changer, and it has significant impacts on certificate lifecycle management. Patrick Nohe of GlobalSign discusses the new, strategic approach security leaders need to take for CLM.
New encryption standards TLS 1.3 and DNS-over-HTTPS (DoH) will soon sweep away security controls. Security professionals must act within the next two years or they won't be able to analyze network traffic and detect cyberthreats.
Download the Forrester report —Maintain Security Visibility in the TLS 1.3 Era —...
1,778 IT and IT security professionals across North America, Latin America, the UK and Europe responded to a new study by the Ponemon Institute, and their responses deliver a clear message to CISOs.
The study tracks the level of importance placed on security analysts, as well as the state of maturity...
Criminals love to amass and sell vast quantities of user data, but not all data leaks necessarily pose a risk to users. Even so, the ease with which would-be attackers can amass user data is a reminder to organizations to lock down inappropriate access as much as possible.
Up to 90% of software security problems are caused by coding errors, which is why secure coding
standards are essential. There are several secure coding practices you can adopt. But, to write truly
secure code, you need a secure coding standard.
Here, we explain what are secure coding standards and how to...
The 475,000 euro fine levied against Booking.com by Dutch privacy authorities should serve as a "wake-up call" for other companies when it comes to GDPR, some experts say. The company waited more than 20 days to report the breach to officials instead of the 72-hour window required under Europe's privacy law.