Norway


As we ride the momentum of the RSA conference, hot cyber topics are still in discussion. The conference is usually more of a full-on sprint than a consistent marathon. With an abundance of information sprouting from new and old cyber topics, it’s hard to process all the information and place it into useful chunks. CSO Online recently published a great recap article of the conference that we found useful. Here is the recap:

  • “Security functionality is moving toward cloud, application, and IT infrastructure.”
  • “Due to the global cyber security skills shortage, many organizations are defaulting to managed security and this will only continue.”
  • Machine learning algorithms are the ‘hot juice.’
  • “Platform vendors must convince skeptical infosec pros that they have best-of-breed products and can hold their hands over a 2 to 3-year timeframe as they replace point tools with an integrated architectural solution.”
  • “Vendors move to develop new solutions that report on high-priority risks (i.e. application security, assets, configuration management, vulnerability management, third-party risk management, etc.) across the whole enterprise enchilada.”

With RSA in the recent past, we shouldn’t forget about the importance of continuous learning in this industry. As the conference clearly highlighted, innovation is key to a successful security future. ITSC continues to be an innovative hub where we highlight and investigate important topics. We’ve highlighted a few articles from April that were most loved by our readers.

Cyber Security Challenges in the Healthcare Industry: The Top Experts Speak  - appointment appointment book blur 40568 150x150 - April Top Read Blog PostsCyber Security Challenges in the Healthcare Industry: The Top Experts Speak

According to the Verizon, the healthcare industry is on the list for most exposed and exploited . Halfway through 2018, the healthcare industry continues to struggle on securing and maintaining security. READ MORE >>

Verizon 2018 Data Breach Investigation Report: Insider Threats & Monitoring  - teramind infosec news banner orange 20180117 1 150x150 - April Top Read Blog PostsVerizon 2018 Data Breach Investigation Report: Insider Threats & Monitoring

This is the 11th edition of the report that offers a comprehensive statistical overview of current cyber security trends and methods of mitigation. In this summary, we’ll be focusing on the ‘human factor’ section and how it relates to insider threats and monitoring. READ MORE >>

Insider Threat Statistics: 2018 Research Reports and Surveys  - business charts data 95916 150x150 - April Top Read Blog PostsInsider Threat Statistics: 2018 Research Reports and Surveys

Already this year, we have a plethora of reports and surveys covering data breaches and insider threats. Don’t have to review them all? We’ve got you covered with this summary of key findings across reports. READ MORE >>

 

HIPAA Compliance Requirements: An Introductory Guide  - arms care check 905874 150x150 - April Top Read Blog PostsHIPAA Compliance Requirements: An Introductory Guide

The Health Insurance Portability and Accountability Act, known among practitioners as HIPAA, contains more than 100 requirements when it comes to three main categories: security, privacy, and breach notification. An expectation across the board with organizations is to have a comprehensive risk analysis completed regularly, a risk management plan, regular employee training, and implementation of security policies and procedures. READ MORE >>

Insider Threat Detection  - teramind free trial banner 1 1200x300 20180117 - April Top Read Blog Posts



Source link

LEAVE A REPLY

Please enter your comment!
Please enter your name here