EU NIS 2 Directive: what it is and how to prepare for it | Kaspersky official blog

Credit to Author: Alanna Titterington| Date: Wed, 26 Jun 2024 13:31:08 +0000

What is the NIS 2 Directive, which companies are affected, what are the consequences of non-compliance, and how to prepare for it.

Read more

Understanding the New SEC Cybersecurity Rules: A Guide for Executives

Credit to Author: gallagherseanm| Date: Mon, 31 Jul 2023 10:00:38 +0000

The new SEC cybersecurity rules significantly enhance disclosure requirements, emphasize the board’s role in risk management, and introduce a stringent four-day reporting timeline, necessitating that public companies bolster their cybersecurity strategies, improve incident response processes, and ensure robust communication plans are in place.

Read more

Medical data sharing: Are we there yet?

Fifteen years ago, if you entered an emergency room a thousand miles from home, the ER doctors would not have had access to potentially lifesaving information in your medical records, such as your allergies or a list of drugs you were taking. Only 10% of US hospitals had electronic health record (EHR) systems, and health record requests were typically sent in paper form by mail or fax machine. Then the federal government stepped in, providing billions of dollars in EHR incentives to help hospitals get online.

To read this article in full, please click here

Read more

Cisco to offer Webex air-gapped cloud system for security, defense work

Building on its WebEx product line, Cisco plans to deliver an air-gapped, cloud-based collaboration system  for companies involved in US national security and defense work, extending the secure offerings the company already provides to industries that require collaboration tools with strong security measures to meet US government requirements.

Beginning in 2024, the new Webex system — Air-Gapped Trusted Cloud — will provide an added layer of security for teams collaborating through the Webex App, Cisco said.

An air gap is a security measure that involves isolating a computer or network and preventing it from establishing an external connection. For example, an air-gapped computer is unable to connect to the internet or any other communications networks so as to have complete security with the information that resides within it.

To read this article in full, please click here

Read more