Healthcare Executive Commentary

  1. Applying Machine Learning To Identify Compromised Credentials
    7/8/2016

    It’s not uncommon for large enterprises to have hundreds or perhaps hundreds of thousands of databases — many out of date, many no longer used, and the vast majority not monitored or properly secured from possible attacks. Unauthorized databases access is increasingly a result of credential theft, and IT personnel are urgently trying to get their arms around the situation. They know they need to not only discover all their own databases, but must figure out how to secure them once they do.

  2. Cyber-threats In 2016: Evolution, Potential, And Overcoming Them
    6/29/2016

    The contemporary business environment is essentially a small subsystem in the larger cyber world. Every enterprise, no matter how technically progressive or apprehensive about technology, is connected to and handles different streams of data. The current IT landscape is highly disruptive, but it does promise better business outcomes for those who are Internet of Things (IoT) ready and prepared to embrace Big Data. However, there are some apprehensions about this more connected, omnipresent, and easily accessible data — it opens many doors to hackers, creating room for Cyber threats to seep in.

  3. Cyber-Security’s Weakest Link: People
    6/27/2016

    A stark reality facing today’s businesses is the never-ending threat to cyber-security and a strategy for how to combat it. An even greater concern is damage to corporate image, consumer trust, loss of revenue, liability to customers, and the ever-increasing statutes imposed by lawmakers and agencies who point the finger at businesses for failure to take responsibility for preventing data theft.

  4. Exploiting Windows Vulnerabilities Shows No Sign Of Slowing: The 6 Major Threats To Watch
    6/24/2016

    Recently, I wrote about the continuing threat Windows users face. Despite the major advances Microsoft has made in terms of increased security safeguards available in the latest release, Windows 10, there are millions of PCs still running older versions of the popular operating system which are highly vulnerable and susceptible to external threats. Of the many flavors of Windows still widely used, Windows 7 remains the most popular version of the operating system and where cyber criminals continue to focus much of their efforts.

  5. 4 Ways To Deal With Cybersecurity Risks
    6/21/2016

    Web application security is a very hot topic these days. So what do CISOs need to know in order to deal with related risks?

  6. Life Imitating Art: Understanding The Dangers Of XSS Attacks
    6/17/2016
    Cross-site scripting, or XSS, is a vulnerability so common that not only is it number three on the OWASP top 10, but it also just become a real-life storyline related to the popular hacking TV drama Mr. Robot. When the USA Network launched the website promoting season two of Mr. Robot, a white hat hacker also immediately uncovered an XSS vulnerability that would have allowed an attacker to gather users’ Facebook information.
  7. 5 Painful Conversations Document Management Software Prevents
    5/18/2016

    If you’re like most employees in the workforce, there are likely people with whom you have trouble working. Although worker traits are as deeply embedded in their personalities as they are capable of causing employee infighting and lowered morale, many disagreements arising in the workplace stem from a far more surmountable issue: the communication barriers imposed by outdated or inefficient technology.

  8. Sales Tech Consolidation Is Gaining Traction: What You Need To Know
    5/4/2016

    Just in the past year or so, sales tech consolidation has received increased attention as the next big thing in the sales industry. And for good reason: dozens of sales tech companies consolidated in 2015, with the clincher coming at the end of the year when Salesforce acquired quote-to-cash vendor SteelBrick.

  9. Combating The Human Component Of Data Security Vulnerabilities: Don’t Let Print Be An Afterthought
    4/19/2016

    In today’s digital world, there are countless ways in which sensitive corporate data can find its way into the wrong hands. But while your customers are focused on protecting information with email encryption and network firewalls, one of their employees could have left a physical document unattended in the printer tray — a major (and completely avoidable) security risk.

  10. The Importance Of Integration And Interoperability In The Search For Event-Driven Intelligence
    4/15/2016

    Today’s modern customers are challenging product and solutions providers to create technologies that deliver the utmost user experience typically found in consumer technologies. Security and business leaders seek more robust interfaces on which to see and interact with data and real-time events. Platforms must be easy-to-use and operate, and integrate with other security functions for efficient event and notification management.