honeypot security

Honeypot Security: Identifying Active Hackers Through Honeypot Deception

Every security expert has a perspective on what (and who) poses the biggest network security threats: cybercriminals, lone hackers, hacktivists, insiders, compromised workstations, and even nation-states. But with so many traffic requests making their way to your corporate network, it can be hard to distinguish attackers from legitimate visitors. While security information and event management… Read More

cyber security skills shortage

How to Address the Cyber Security Hiring Gap: Tips from an HR Executive

Cyber Security Talent Shortage: How We Got Here While the cyber security industry is growing significantly faster than other markets, the challenge to fill more than 500,000 open computing cyber security positions is a serious issue spanning business as well as federal, state, and local government. Many colleges and universities saw the worker shortage coming years ago, and in… Read More

2016 ISSA International Conference Recap: People Drive Cyber Security Strategy

The 2016 ISSA International Conference concluded last week in Dallas. This year’s two-day conference, themed, “Survival Strategies in a Cyber World,” featured two keynotes, a variety of breakout sessions, and compelling panel discussions from a wide range of thought leaders in the cyber security space.

FTC HIPAA enforcement

FTC Expanding its Role in HIPAA Enforcement Actions

In new joint guidance released from the Federal Trade Commission (FTC) and U.S. Department of Health and Human Services Office for Civil Rights (OCR), HIPAA covered entities and business associates are reminded that they are subject to enforcement of both HIPAA regulations and deceptive business practices under the FTC Act. A covered entity or business… Read More