OnPage News: Healthcare Cyberattacks

healthcare cyberattacks

10 Trends in Cyberattacks in Healthcare, other Industries, new survey shows Article Courtesy of:  Healthcare IT News – Written By Bernie Monegain This year the top motivation wasn’t hacktivism or vandalism, but ‘criminals demonstrating attack capabilities,’ Arbor Networks report claims. Cyberattacks around the world are growing in size and complexity, according to Arbor Networks 11th Annual Worldwide Infrastructure Security Report, released January 26 by Arbor Networks, the security division of NETSCOUT. For the first time, nearly half of the respondents were from enterprise, government and educational organizations, with service providers at 52 percent. Healthcare is one of the verticals included in the enterprise category. The survey garnered 354 responses, up from 287 received last year, from a mix of Tier 1 and Tier 2/3 service providers, hosting, mobile, enterprise and other types of network operators from around the world. “This report provides broad insight into the issues network operators around […] Read more »

OnPage News: Data Center Cybersecurity

data center cybersecurity

The New 80-20 Rule for Data Center Cybersecurity Article Courtesy of:  SC Magazine – Written by: Alan S. Cohen @ Illumio . For much of the IT industry, 2014 was the year of the hack.   Reporters and analysts investigated and wrote incessantly about the seemingly hourly break-ins of corporate computer systems, culminating with the Sony incident associated with the release of “The Interview.” Undoubtedly, the cybersecurity challenge is going to result in an increasing focus and spend on security systems.   The question, however, is whether this will reduce the risk. Let’s start with the corporate data center, the Fort Knox of the enterprise, and how we guard its crown jewels.  Today, the vast bulk of security spend is on the network — firewalls, IDS/IPS, APT, monitoring, etc. — and it focuses almost exclusively on the internet perimeter. These investments account for over $10 billion in hardware/software spend alone (this […] Read more »

OnPage News: Cloud Security

OnPage Cloud Security

Cloud security market to be worth $12 billion by 2022, here’s why Article Courtesy of:  TechRepublic A recent market study by Transparency Market Research projects the cloud security market to grow to $11.8 billion by 2022.   Here are the factors that could fuel that growth. A recent study performed by Transparency Market Research (TMR) projects that the global cloud security market will grow to a valuation of $11.8 billion by the year 2022. To put that into perspective, in 2014 TMR put the value of that same market at $4.5 billion. The report, officially titled Cloud Security Market – Global Industry Analysis, Size, Share, Growth, Trends and Forecast 2014-2022, was officially released on Thursday. In the report, TMR predicts that the cloud security industry is due to experience a 12.8% compound annual growth rate (CAGR) between 2015 and 2022. There are a few different reasons behind the growth, as […] Read more »

OnPage News: Data Security Strategy

Data Security - Cyber Security

Why We’re So Vulnerable Article Courtesy of:  MIT Technology Review An expert in U.S. national cybersecurity research and policy says the next generation of technology must have data security built in from the very start. In an age of continuing electronic breaches and rising geopolitical tensions over cyber-espionage, the White House is working on a national cybersecurity strategy that’s expected in early 2016. Helping to draft that strategy is Greg Shannon. He was until recently chief scientist at Carnegie Mellon University’s Software Engineering Institute and is now on leave to serve as assistant director for cybersecurity strategy at the White House Office of Science and Technology Policy. In an interview with MIT Technology Review senior writer David Talbot, Shannon explained that dealing with today’s frequent breaches and espionage threats—which have affected federal agencies as well as businesses and individuals—requires fundamentally new approaches to creating all kinds of software. Fixing the infrastructure […] Read more »