To better counter threats carried by content - email, attachments, files - Deep Secure's Simon Wiseman says organizations should investigate content threat removal, which involves extracting required data from content and discarding the rest.
Europe's General Data Protection Regulation is reshaping the way organizations handle data. That's going to have an impact on the sharing of threat intelligence. But the Anti-Phishing Working Group hopes the law will provide legal clarity that will make more organizations comfortable with sharing threat data.
Congress is considering how to help beef up the healthcare sector's preparedness and response to cyber threats. But why is there so much confusion about the role of the Department of Health and Human Services?
Government and defence are facing an unprecedented threat from cyber-attack. In the communication infrastructure, files or documents are an essential tool for citizen-to-government and real-time information sharing between networks of varying security classifications and enclaves.
Weaponised files embedded with...
European computer security researchers say they have discovered vulnerabilities that relate to two techniques used to encrypt emails: PGP and S/MIME. Security experts recommend all PGP users immediately delete or disable their PGP tools, pending a full fix.
Thirty-four companies have signed on to the Microsoft-led Cybersecurity Tech Accord, which is aimed at protecting civilians from cybercriminal and state-sponsored attacks. The agreement crucially includes a pledge not to help governments with cyberattacks
Processing and parsing intelligence from all sources - external and internal, structured and abstract - across three important categories is essential to a proactive, predictive threat intelligence framework, says Verizon's Ashish Thapar
The adoption of e- and m-commerce has created new opportunities for fraudsters to falsify identities and defraud merchants, consumers, and banks out of millions.
However, preventing fraudulent transactions with fewer instances of false positives is possible by leveraging shared transaction data from a consortium of...
Unified Communications as a Service (UCaaS) from Windstream is a robust, sophisticated solution on a single unified platform hosted in an enterprise-class data center and accessible through the cloud. With a customized UCaaS solution that provides greater data security, we manage your communications needs and...
The White House, fearing China is spying on phone calls, has suggested that the U.S. government take a primary role in marshaling the development of secure 5G networks. But would nationalizing 5G networks make them more secure?
An assessment on whether North Korea is behind the WannaCry ransomware attacks leads the latest edition of the ISMG Security Report. Also, the co-author of NIST's revised Trustworthy Email special publication discusses changes in the guidance.
The healthcare industry (hospitals in particular) is one of the top industries targeted for cybercrime. Given the high value of a stolen healthcare record, motivated adversaries will continue to go where the money is.
Download this guide and learn:
The three most common DLP use cases in healthcare systems;