article thumbnail

New Tech Spotlight: Security Technology Takes Center Stage

Forrester IT

Venture capital and private equity spending on security technology reached an all-time high in 2018. While that total may pale in comparison to other fast-growing markets such as fintech ($124B) or transportation tech ($150B), consider that 65% of that $31B in security has […].

Security 321
article thumbnail

Patient Portal Puts a Spotlight on Secure Messaging

CTOvision

Stage 2 requires expanded use of patient portals, as well as implementation of secure messaging, allowing patients to exchange information with physicians regarding their health care. Secure Messaging Requires Authentication and Secure Networks.

Security 267
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Securing 5G for 2023 and beyond

CIO Business Intelligence

By Anand Oswal, Senior Vice President and GM at cyber security leader Palo Alto Networks While mobile technology has been around for decades, the current generation, 5G, is increasingly being recognized for the exciting new benefits it brings to enterprises, SMBs, and public sector organizations. Security needs to keep up.

Security 114
article thumbnail

Zero Trust Security for NIS2 compliance: What you need to know

CIO Business Intelligence

Over 100,00 organizations are expected to be impacted by Network and Information Security Directive (NIS2) cybersecurity standards that European Union (EU) member states must implement by October 2024. [i] This concept of least-privilege access is fundamental to Zero Trust Security practices.

article thumbnail

DoD Announces Third 'Hack the Pentagon' Bug Bounty Program

SecureWorld News

The program, first launched in 2016, aims to leverage the expertise of the private sector and commercial crowdsourcing best practices to enhance the information security of the DoD. These firms will host crowdsourced security activities on behalf of the DoD.

article thumbnail

The 4 pillars of the Zscaler Zero Trust Exchange: Customers share their successes

CIO Business Intelligence

We’ve all heard this mantra: “Secure digital transformation requires a true zero trust architecture.” As the zero trust platform provider of choice for 40% of the Fortune 500, Zscaler has long been recognized as the leader in zero trust and, by extension, cloud security. But what exactly does that mean? Zero trust has come a long way.

article thumbnail

CISO Journeys into Ukraine to Rescue Coworker

SecureWorld News

The stakes are high when the security of your organization ultimately rests on you. Smeaton, the Chief Information Security Officer for DataRobot based in Boston, shared his harrowing experience with the SecureWorld Boston audience at this week's conference. Smeaton is the Chief Information Security Officer at DataRobot, Inc.,