You Are Here: Home » Security

How good leadership can improve cyber security outcomes

While attending the Healthcare Privacy & Security forum in Boston recently, I had the good fortune of sitting in on two presentations, one by Beth Israel Deaconess Medical Center CIO John Halamka, M.D., the other by CynergisTek CEO Mac McMillan. Both are prominent health IT experts who understand the critical need for security in healthcare. They were not talking about technologies or methods, per se. I ...

Read more

Data breach PR: How to survive your worst nightmare

There are two kinds of companies in this world: Those that have experienced a data breach, and those that will at some point in the future. At least that’s how seasoned cybersecurity experts approach risk assessment and mitigation plans. From a public-relations standpoint, once internal – or external – parties discover a data breach, a company’s immediate reaction will set the tone of the reportage. It’s a ...

Read more

Experts Assess Cyber Security Threats in Medical Technology

https://www.youtube.com/watch?v=cqCUehGEq80 As the number of patients using medical devices – worn or implanted – exponentially grows, to what extent is their privacy or safety at risk from hackers? And, how are medical technology manufacturers, security software developers and regulators like the FDA addressing this issue of data breaches? Given the growing prominence of medical technology delivery systems ...

Read more

Quick HITs: Health data’s allure to hackers

It’s a mantra security experts and reporters repeat so frequently that it’s a given, a fact-by-repetition, a subjective opinion so true it can’t be false: Hackers love health data because it’s worth so much more than financial data. But why? Can you really explain why? Yes, some underserved individual patients so desperate for treatment (or, perhaps, access to controlled substances) might look for opportuni ...

Read more

IT Security Pros Primed for Black Hat Videos & RSA Speaking Submissions

This week, RSA Conference will open its speaking submission process for next year's event, scheduled for late February in San Francisco. And not too far from now in early August, Las Vegas will play host to the Black Hat USA conference. At MSLGROUP, we're busy on both fronts. For RSA Conference, we're analyzing accepted abstracts our teams drafted last year to see what worked. That insight will be applied d ...

Read more

PR Lessons Learned In 1H 2015: Part One

With the end of the first half of the year approaching, MSLGROUP decided to take a look back at the PR lessons learned thus far in 2015 and what they mean for our industry and our clients. Without further ado: 1. In times of crisis, early, frequent, honest communication that provides next steps is best. While not a completely new idea, 2015 has shown us a few different examples of brand crises done right an ...

Read more

Data Security Takes a Front Seat in Healthcare

With the recent rash of breaches at prominent healthcare organizations this year, it was no surprise that health data security was top of mind among CIOs at HIMSS15. Show organizers added the Cyber Security Command Center in a new exhibit area as attendees felt pressure mounting to pass strict security tests in the wake of new data breaches and random HIPAA audits coming later this year. MSLGROUP Boston’s s ...

Read more

Video: What Everyday People Know About Encryption

“Where the world talks security” was the tagline at this year’s RSA conference where 30,000 IT vendors and technology professionals exchanged ideas about security threats and products. A week later as media headlines continue to report the latest security breaches and privacy debates, it seems the security conversation has extended beyond the aisles of Moscone to the dinner table, spin class and playground. ...

Read more

RSA 2015: Into the Woods: Protecting Our Youth from the Wolves of Cyberspace

When talking cybersecurity, it’s far more common to be thinking about malware than social issues. However during this year’s RSA Conference, information security and child safety crossed paths for a discussion on how to protect children from becoming victims of cybercrime. As technology has gotten increasingly more sophisticated, unfortunately so have the potential threats facing kids. Michael Osborn, chief ...

Read more

RSA 2015: Quantitative Security: Using Moneyball Techniques to Defend Corporate Networks

When Oakland A’s General Manager Billy Beane embraced an analytic approach to building the dream team, he revolutionized baseball. What if organizations embraced a similar approach to choosing security solutions? The current method is more of an art than a science, Amit Mital, CTO, Symantec noted in his keynote at RSA. By adopting a quantitative approach to data and security, organizations can make better i ...

Read more

RSA 2015: Talking ‘bout My Next Generation

The time is now. The security generation needs to invest in the next generation of talent, Christofer Hoff, vice president and security chief technology officer, Juniper Networks, urged his colleagues during his RSA keynote. Hoff teamed up with Reuben Paul to demonstrate how even a third-grader can successfully launch a cyberattack. The nine year old has an impressive track record. He’s CEO of Prudent Games ...

Read more

RSA 2015: Enhancing Cloud Trust

When it comes to information security, the move to the cloud highlights two key features: transparency and control.  Scott Charney, Corporate VP of Trustworthy Computing at Microsoft, raised the question of how it is possible for people to provide control and transparency in this new environment, and what it looks like. During his RSA keynote, Charney addressed Microsoft’s 2004 plan to implement a security ...

Read more