Determining which tools to use in the event of an emergency lockdown can play a huge role in the outcome of a violent situation. When deciding which tools suit their organization, security leaders should have these questions in mind.
The Strengthening Cybersecurity in Medical Devices Act has been introduced in Congress — what ramifications will it have for healthcare security leaders?
Long-time cybersecurity expert Tomer Gershoni will lead ZoomInfo's security team, overseeing physical and digital security and privacy efforts as its Chief Security Officer (CSO).
The Third-Party Vendor Risk Management in Healthcare report from the Cloud Security Alliance (CSA) provides an overview of the third-party vendor security risks healthcare organizations face.
A recent study from Northwestern Universitypredicts that the opioid crisis is far from over. Overdoses in rural and urban areas will spike all across the United States, researchers find.
The global average cost of a data breach has reached an all-time high of $4.35 million, according to IBM Security's annual Cost of a Data Breach Report.
As Chief Information Officer at Deep Instinct, Carl Froggett will play a key role in enhancing the company's enterprise security and cybersecurity posture.
The risk assessment process shouldn't be dreaded. Get ready to breathe easier with six steps to move toward a smoother risk assessment process and much tighter security.