Moderna disclosed that it spent a modest amount on security for CEO Stéphane Bancel last year and other Moderna executives in the $1 million range, though it had previously spent nothing on executive protection.
The COVID-19 Oxford Vaccine Trial run by the University of Oxford's Jenner Institute and the Oxford Vaccine Group clinical teams needed tight security surrounding the facility to mitigate risk and ensure the safety of staff and assets.
According to the Emergency Nurses Association, healthcare workers account for approximately 50% of all victims of workplace violence. But they're not the only ones either. There are reports of increased domestic violence and workplace violence around the world as a result of lockdowns from the pandemic, increased stress levels and a lower threshold for confrontation.
Learn how to give healthcare security staff the tools they need to perform their varied job functions to the best of their ability, while maintaining safety and security for staff and patients, and encouraging a solid, trustworthy, honest and long-term security team.
The Security Benchmark Report (formerly the Security 500) survey is now open! Calling all enterprise security leaders within your organization...fill out the survey today and help us benchmark where security lies within every sector and industry.
Access to clinical applications and medical information in a digital healthcare environment is vital. Yet, careful consideration must be made to ensure data and systems are protected against unintended or malicious activities. Securing infrastructure and applications is essential and security professionals must not forget about the devices that facilitate, segregate and protect the network.
We asked several Women Security Leaders to tell us what drew them into the profession, along with their thoughts on continued diversification of the industry.
Original research from CybelAngel takes a look at how cybercriminals plan healthcare-related fraud, ransomware and other attacks by obtaining stolen credentials, leaked database files and other materials from specialized sources in the cybercrime underground.