Protecting Data When an HIE Shuts Down (Healthcare Info Security)
Wisconsin Health Information Exchange Leader Explains Steps http://www.healthcareinfosecurity.com/protecting-data-when-hie-shuts-down-a-5698
View ArticleMachine Learning Susses Out Social-Network Fraud (Dark Reading)
Certain characteristics of social-network accounts have a high correlation with fraud and can be used to differentiate between real and fake accounts...
View ArticleBoston CIOs Share Lessons Learned (Healthcare Info Security)
Bombings Highlight Need for Business Continuity Plan Scrutiny http://www.healthcareinfosecurity.com/boston-cios-share-lessons-learned-a-5707
View ArticleEnhance Your Windows Server Security (Redmond Mag)
There are a variety of features and settings for securing your Microsoft Windows Server infrastructure, so be sure you make the right choice....
View ArticleTwitter Preps Two Factor Authentication After AP Hoax (Information Week)
Security move follows a rash of high-profile account takeovers, including a hoax tweet from the Associated Press' account about White House explosions....
View ArticleMedical Device Security Advice (Healthcare Info Sec)
Companies that manufacture medical devices can play a key role in ensuring data security issues are addressed. http://www.healthcareinfosecurity.com/blogs/medical-device-security-advice-p-1457
View ArticleTech Insight: Time To Set Up That Honeypot (Dark Reading)
A combination of traditional network security monitoring and recent advancements in honeypot and active defense tools is key to detecting today's threats...
View Article86% Of Websites Have At Least 1 Serious Vulnerability (Information Week)
While websites harbor fewer bugs overall, 86% of sites have at least one serious flaw that could be used in an attack, reports WhiteHat Security....
View ArticleProtecting an Organization's Reputation (Bank Info Security)
Credibility New Target for Cyber-Attacks http://www.bankinfosecurity.com/protecting-organizations-reputation-a-5725
View ArticleMedical identity theft to be explored at FTC hearing (SC Magazine)
The Federal Trade Commission next week will host a hearing examining identity theft affecting senior citizens, and a portion of the discussion will focus on the the rising rates and awareness of...
View ArticleSweet Password Security Strategy: Honeywords (Information Week)
To improve detection of database breaches, businesses should store multiple fake passwords and monitor attempts to use them, according to researchers at security firm RSA....
View ArticleBig Data Alchemy: Turn Info Into Money (Information Week)
Data markets could become a new market category. Here, companies buy, sell or trade data for mutual benefit....
View ArticleDealing with BYOD Security Risks (Redmond Magazine)
IT is now challenged with implementing personal device security procedures that keeps networks safe from infection and protects data from being lost or stolen....
View ArticleUsing Big Data to Predict Attacks (Bank Info Security)
How Data Analysis Speeds Detection, Response http://www.bankinfosecurity.com/using-big-data-to-predict-attacks-a-5760
View ArticleWeb Application Testing Using Real-World Attacks (Dark Reading)
Using exploits to test Web applications can be an enlightening way to test for vulnerabilities, but there are downsides as well....
View Article
More Pages to Explore .....