How to avoid being the next hospital breach
The increasing security issues and what steps hospitals can take to mitigate them
Kacy Zurkus | 08 Jul | Read more
The increasing security issues and what steps hospitals can take to mitigate them
Kacy Zurkus | 08 Jul | Read more
Earl Perkins, Research Vice President in Integrated Security and Risk Strategies, opened the Gartner Security and Risk Management Summit at Sydney’s Hilton Hotel with a statement that summarises the current state of play in the intersection between technology, business and security. The conference theme, managing risk and delivering security, is founded on six principles that will allow businesses to deliver on business needs in an increasingly complex adversarial environment.
Anthony Caruana | 24 Aug | Read more
ISO/IEC 27001:2013 specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organisation. It was recently updated and Dr. Angelika Plate formerly of the German Information Security Agency and now an independent consultant, walked through the changes at AusCERT 20
Anthony Caruana | 04 Jun | Read more
A string of high-profile data breaches in 2012, from LinkedIn to Global Payments, have kept enterprise data security in the limelight. But most organizations still tend to be reactive and focus on firefighting when it comes to data security, rather than implementing a more effective long-term strategy. Let's examine the four most common pitfalls of this short-sighted approach.
Ashvin Kamaraju, VP product development and partner management, Vormetric | 24 Dec | Read more
The aim of this article is to provide companies that offer outsourced services, (dealing with the management of information), some tangible, commercial benefits to go down the ISMS implementation and certification path.
Mark Jones | 13 Sep | Read more