Ranked #1
Analysis: COVID-19 Contact-Tracing Privacy Issues
Analysis: COVID-19 Contact-Tracing Privacy Issues
The latest edition of the ISMG Security Report analyzes the privacy issues raised by COVID-19 contact-tracing apps. Also... Read more
24 Apr 2020
•
Ranked #2
'Alexa, Are You HIPAA Compliant?'
'Alexa, Are You HIPAA Compliant?'
Boston Children's Hospital is pioneering the use of Amazon's Alexa voice assist technology in the healthcare sector. Joh... Read more
16 Apr 2019
•
Ranked #3
Planning for Financial Impact of Data Breaches
Planning for Financial Impact of Data Breaches
Healthcare organizations need to plan ahead for the financial burden of data breaches stemming from cyberattacks and als... Read more
8 Apr 2019
•
Ranked #4
The Changing Role of DPOs
The Changing Role of DPOs
Data protection officers are assuming a more strategic role that goes beyond ensuring compliance with laws and regulatio... Read more
27 Sep 2019
•
Ranked #5
Healthcare Cybersecurity Info Sharing Resource Unveiled
Healthcare Cybersecurity Info Sharing Resource Unveiled
A new resource designed to help healthcare organizations of all sizes engage in cybersecurity information sharing is now... Read more
25 Sep 2019
•
Ranked #6
Case Study: How IU Health Manages Vendor Security Risk
Case Study: How IU Health Manages Vendor Security Risk
What are some of the most important aspects in managing vendor security risk when taking on third parties to handle sens... Read more
30 Sep 2019
•
Ranked #7
Critical Steps in Managing Vendor Security Risk
Critical Steps in Managing Vendor Security Risk
In light of recent ransomware and other cyberattacks against vendors serving numerous healthcare organizations, it's cri... Read more
14 Jan 2020
•
Ranked #8
Responding to Ransomware Attacks: Critical Steps
Responding to Ransomware Attacks: Critical Steps
Organizations must take a number of critical steps to prepare a response to ransomware attacks before they hit, says Cal... Read more
7 Oct 2019
•
Ranked #9
The Importance of Setting Patching Priorities
The Importance of Setting Patching Priorities
Recent alerts from federal regulators about patching vulnerabilities in the Windows 10 operating system highlight the im... Read more
17 Jan 2020
•
Ranked #10
'Wartime' Security Mentality Revisited
'Wartime' Security Mentality Revisited
Five years ago, cybersecurity executive Dave Merkel called upon enterprises to shed their "peacetime" mindsets and adopt... Read more
15 Jan 2020
•
Ranked #11
Analysis: Fallout From the Snowden Memoir
Analysis: Fallout From the Snowden Memoir
The latest edition of the ISMG Security Report features a discussion of the controversies surrounding the release of whi... Read more
20 Sep 2019
•
Ranked #12
Analysis: New Details on the Hacking of Jeff Bezos' iPhone
Analysis: New Details on the Hacking of Jeff Bezos' iPhone
The latest edition of the ISMG Security Report offers an analysis of fresh details on the hacking of Amazon CEO Jeff Bez... Read more
24 Jan 2020
•
Ranked #13
Cloud Security: Overcoming Roadblocks
Cloud Security: Overcoming Roadblocks
While secure coding has always been an imperative, in a cloud-based environment, BMC Software's Rick Bosworth says it is... Read more
16 Jan 2020
•
Ranked #14
Analysis: Huawei's US Trust Problem
Analysis: Huawei's US Trust Problem
The latest edition of the ISMG Security Report analyzes concerns about the use of Huawei equipment by U.S. telecommunica... Read more
4 Oct 2019
•
Ranked #15
Defending Against Authorized Push Payment Fraud
Defending Against Authorized Push Payment Fraud
The advent of faster payments has helped accelerate authorized push payment fraud schemes in which victims are defrauded... Read more
16 Apr 2019
•
Ranked #16
Tips on Protecting Hospitals From Nation-State Attacks
Tips on Protecting Hospitals From Nation-State Attacks
In light of rising tensions between the U.S. and Iran, the Association of Executives in Healthcare Information Security ... Read more
22 Jan 2020
•
Ranked #17
The Role of Satellites in Quantum Key Distribution
The Role of Satellites in Quantum Key Distribution
Could satellites play a role in distributing next-generation encryption keys? Robert Bedington, CTO and co-founder at Si... Read more
20 Jan 2020
•
Ranked #18
Remote Workforce Security: The Role of 'Zero Trust'
Remote Workforce Security: The Role of 'Zero Trust'
Kevin Schwarz of Zscaler discusses the security implications of the "new normal" of employees working from home, includi... Read more
21 May 2020
•
Ranked #19
The Need to 'Streamline' Risk Management During the Pandemic
The Need to 'Streamline' Risk Management During the Pandemic
To keep up with security issues raised by the transition to a much larger remote workforce and expanded telehealth servi... Read more
14 May 2020
•
Ranked #20
Testing Medical Device Security During COVID-19 Crisis
Testing Medical Device Security During COVID-19 Crisis
As manufacturers - including companies such as automakers that do not typically produce healthcare devices - race to hel... Read more
8 May 2020
•