Skip to main content

Privacy & Security

By Ephraim Schwartz | 08:04 am | July 11, 2016
A threat that could compromise a device automatically signals Cisco’s Identity Services Engine and Cisco TrustSec to quarantine and prevent the attack.
By Ephraim Schwartz | 08:03 am | July 11, 2016
Symantec Data Center Security uses a combination of host-based intrusion detection (HIDS), intrusion prevention (HIPS) and least privilege access control.
By Ephraim Schwartz | 08:02 am | July 11, 2016
Fortinet uses an integrated approach to scan both perimeter and internal traffic to protect not only the data center but medical devices as well.
By Ephraim Schwartz | 08:01 am | July 11, 2016
IBM's Protocol Analysis Module (PAM) uses heuristics and behavior-based analysis to identify and stop threats.
By Ephraim Schwartz | 08:00 am | July 11, 2016
The Threat Discovery Center used by Damballa to assess traffic using its behavioral analysis software.
By Ephraim Schwartz | 08:00 am | July 11, 2016
Juniper maximizes computing power in the cloud as files traverse various security devices by forking the file and sending a copy to its cloud-based service.
By Mike Miliard | 12:31 pm | July 08, 2016
The Office of the National Coordinator for Health IT is looking for ways that blockchain could be put to work in healthcare scenarios.
By Jessica Davis | 01:05 pm | July 07, 2016
Proposed legislation would elevate Health and Human Services' CISO from its current position under the CIO. Whether it passes or not, the notion is raising questions about typical reporting structures in the healthcare C-suite.
By Mike Miliard | 12:30 pm | July 07, 2016
As cybersecurity threats proliferate so do the promises and proposed easy fixes from technology companies, the Institute for Critical Infrastructure Technology said. And in a market with more than 1,200 competitors, vendors don’t always live up to their claims.
By Jack McCarthy | 10:55 am | July 07, 2016
The high number of breaches span payers, providers and an NFL team and prove just how vulnerable the industry is, the new Healthcare Breach Barometer from Protenus and Databreaches.net said.