Information Security

The SecurityInfoWatch.com Information Security product category is a collection of news, product listings and other resources for security professionals researching Information Security solutions. It covers a wide variety of network security hardware and software products.
Credit: Jacob Wackerhausen
The Change Healthcare cyberattack made a lasting impact on the healthcare industry and security professionals worldwide. Over a year later, it is still pointed to as an example of a breach that can have devastating consequences, but the lessons security leaders can take away will help them be better prepared for the future.
April 16, 2025
Lessons for cybersecurity leaders include that security solutions and protocols must evolve as cyberattacks continue to evolve.
Credit: PeopleImages
The healthcare sector faces unique cybersecurity challenges due to the sensitive nature of the data it handles and the critical services it provides. By understanding the various vulnerabilities and implementing robust security measures, healthcare organizations can better protect themselves against cyber threats.
Understanding vulnerabilities and implementing strong security measures help healthcare organizations defend against cyber threats.
Credit: designer491
Ransomware groups now specifically target healthcare providers, knowing that the immediate need to restore patient care services increases the likelihood of ransom payments.
March 13, 2025
Effective implementation hinges on transparent communication with staff, patients, and business partners about new security measures and their impact on workflow.
Credit: Oselote
Today, IoT devices, including physical security products, often operate in diverse and remote environments, with fleets typically ranging from thousands to tens of thousands of devices.
March 13, 2025
Legacy methods of updating physical security devices, like manual intervention or USB-based updates, are outdated and impractical in today’s interconnected landscape.
Credit: Tero Vesalainen
gettyimages1065782564
March 13, 2025
As healthcare policy takes center stage, recently enacted cybersecurity legislation is poised to redefine patient privacy and data security. At the forefront of these changes ...
360_privacy_dashboard
March 11, 2025
ISC West 2025 Booth 33045: Tool removes Personally Identifiable Information (PII) from the open web and data broker websites.
desi_chip_photo
ISC West 2025 Booth 32069: Upgrade new or existing readers and sensors into Zero Trust devices with PKI-secured encryption.
swear_validation_tool
March 10, 2025
ISC West 2025 Booth 31086
photo / iStock / Getty Images Plus / Getty Images
If properly implemented with AI, DevSecOps provides a more efficient software development workflow by automating some of the steps and security gates.
March 4, 2025
Organizations must be prepared to fight AI cyberattacks with AI-powered DevSecOps.
March 3, 2025
Now is the time for organizations to evaluate their authentication strategies proactively.
Alexander Sikov / iStock / Getty Images Plus via Getty Images
In 2024, the healthcare sector experienced an unprecedented increase in ransomware attacks, affecting over 198 million Americans. Among these incidents, the Change Healthcare breach stood out as one of the largest in history, impacting more than 100 million individuals. Source: SonicWall
Feb. 25, 2025
The 2025 SonicWall Cyber Threat Report reveals that cybercriminals are exploiting vulnerabilities faster than organizations can patch them, putting SMBs and healthcare providers...
Credit: Vladimir Vladimirov
As businesses and governments pour resources into developing proprietary quantum algorithms, they will become invaluable, shrouded in secrecy, and fiercely guarded.
Feb. 24, 2025
As quantum computing reshapes the corporate battlefield, espionage is evolving beyond hackers and spies—organizations must master quantum security or risk losing their competitive...
Credit: stuartmiles99
Getting control over identity management requires a comprehensive and ongoing process from risk assessment through daily management.
Feb. 24, 2025
Amid a rising tide of data breaches, organizations are struggling to control identity management options.
Credit: BeeBright
DORA also affects regions outside of the EU. Although the Digital Operational Resilience Act (DORA) is an EU regulation, it is also applicable in the U.S. market. It enforces third-party risk management by holding financial institutions accountable for their vendors' operational resilience.
Feb. 19, 2025
U.S. organizations are looking to embrace similar regulatory guidelines across myriad sectors.
Credit: danijelala
By gaining access to an employee’s credentials, a bad actor also gains access to their account privileges, especially if the same credentials are used across multiple accounts.
Jan. 29, 2025
If credentials are compromised, spotting the breach quickly, the damage can be contained.
Credit: Just Super
A platform-agnostic Managed Detection and Response (MDR) solution refers to a service provider that offers MDR services independently of any specific cybersecurity platform or technology stack, becoming a “platform” in and of itself, along with advisory services that help select the best-of-breed tooling.
Jan. 29, 2025
Whether opting for an integrated platform or a mix of specialized tools, the key is establishing a robust cybersecurity strategy.