Tripwire Tuesdays: Vital Signs – Security and Compliance in Healthcare

How can healthcare organizations ensure compliance and security in the face of increasing cybersecurity challenges? Tripwire customer MedExpress represented by Adi Sitnica, director of information security and compliance, shared some insights about how… Continue reading Tripwire Tuesdays: Vital Signs – Security and Compliance in Healthcare

Policium Concisium: Advice on Writing a Security Policy

What do your policies look like? If your organization is like most, then your policies are probably voluminous and all-encompassing. This is a good thing – or is it? Probably one of the most painful aspects of being an infosec professional is having to author or review policies. (Audit is the other painful aspect.) When […]… Read More

The post Policium Concisium: Advice on Writing a Security Policy appeared first on The State of Security.

The post Policium Concisium: Advice on Writing a Security Policy appeared first on Security Boulevard.

Continue reading Policium Concisium: Advice on Writing a Security Policy

ExpertOps: More Security with Less Time

When you work for the office of your organization’s chief information security officer (CISO), time is not your friend. In 2015, the average time from compromise to discovery of a security incident was 146 days. That figure dropped to 99 days in 2016. Even so, the pressure is still on for organizations to do more […]… Read More

The post ExpertOps: More Security with Less Time appeared first on The State of Security.

The post ExpertOps: More Security with Less Time appeared first on Security Boulevard.

Continue reading ExpertOps: More Security with Less Time

Thunder on the Horizon: 4 Security Threats for the Cloud

Security is both a benefit and a concern for enterprises when it comes to cloud computing. On the one hand, Datamation found in its State of the Cloud, 2019 survey that many organizations are moving to the cloud because they found that cloud-service pr… Continue reading Thunder on the Horizon: 4 Security Threats for the Cloud