All the latest blog posts from the most relevant cyber security companies in the business.

Several leading health systems got together recently to announce the formation of Truveta, an independent company that will pool patient medical records from the participating health systems and analyze them for insights to drive healthcare outcomes. The announcement highlighted the benefits of sharing de-identified data for driving research, new therapies, and improved health outcomes. In…

The Risk Management Framework (RMF) was first developed by the Department of Defense (DoD) to act as criteria for strengthening and standardizing the risk management process of information security organizations. The framework later became widely adopted by the rest of the U.S. federal information systems in 2010. While originally developed by the DoD, the National…

How blockchain is impacting information security in companies

Hype surrounding any subject can be either positive, or negative; and at this point in the tech sphere nothing exemplifies this idea more than blockchain. On a positive note, the hype surrounding the decentralized technology is for the most part positive and exciting, being as the tech is considered revolutionary and applicable to virtually all…

Cyber insurance: Is it worth the investment?

Last year, Aon Inpoint reported about 80 percent of buyers of stand-alone cyber premiums were medium-sized to large companies. However, smaller firms are increasingly assessing their cyber exposure risk as concerns about the potential impact of a cyber incident continue to rise. “The majority of breaches worldwide occur at companies with 1,000 employees or less…

Can AI help bridge the IT security skills gap?

Host Steve Ragan reports from the show floor at RSA 2018, taking with Oliver Tavakoli, CTO at Vectra Networks, and author of the Thinking Security blog on CSOonline.com, about the types of IT security work that can be off-loaded to artificial intelligence systems.

How to manage IT risk without killing innovation

Startup slogans are inescapable in tech: Move fast. Break things. Minimum viable product. These are exciting ideas, for sure, but to put them to use in IT, you’ll need to tailor them to your context. For IT executives running established businesses, the risk-reward scenario is different. Thousands or millions of customers depend on your infrastructure….

Data privacy: What your employees don’t know but should

What do employees in your organization understand about security, data privacy, and compliance? According to a recent report from Bothell, Wash.-based MediaPro, perhaps not as much as they should. With data privacy fast becoming a hot-button issue, and the European Union’s General Data Protection Regulation (GDPR) right around the corner, what your employees don’t know…

After a cyberattack, companies remain vulnerable. What CIOs can do to protect their brands

Here’s a security scenario that’s all too common: A company suffers from a cyberattack, then responds to it promptly and alerts its customers, warning them to change their passwords. But the company remains vulnerable through the very means it uses to alert those customers: Email. In fact, attackers can exploit that vulnerability using email that…