After being caught off-guard by security issues that were exposed during the Covid-19 pandemic, CISOs are rethinking their disaster recovery and business continuity plans, according to Shefali Mookencherry, Brian Cayer and Jonathan Langer.
What are the key differences between endpoint detection, extended detection and managed detection response solutions, and how can IT leaders make the best possible selection based on their organization’s needs? David Chou provides a “quick guide” on what CIOs, CTOs and CISOs need to know.
With attacks becoming more widespread and damaging, it no longer falls on a single department – or health system – to manage it alone, according to our cybersecurity experts. “You need a lot of friends to get this done.”
With phishing attacks becoming increasingly sophisticated, the smart approach is to focus not on prevention, but on identifying the most likely targets, putting controls in place, and offering continuous education, according to our cybersecurity experts.
As healthcare organizations begin to sort through the wreckage from Covid, one of the key priorities is “getting their arms around” identity governance, according to our IT security experts, who shared lessons learned during a recent panel discussion.