More Cybersecurity Articles

Cybersecurity

Cyber Attacks Know No Barriers

Editor: What does the current cyber threat landscape appear to be? Plesco: There has been a significant increase in cyber attacks due to the development of new technologies and the utilization of those technologies by way of mobile devices, social media, cloud computing and other new media. The...

Read More

Cybersecurity

Keeping It Clean: Workshare’s Protect Gets Metadata Under Control In A Mobile World

Editor: There has been a lot of news around metadata and how this is jeopardizing the privacy of information and documents. Hadfield: Interestingly, I recently saw news reports about protests against NSA snooping in Washington, DC, and one of the placards read, “Hands off my metadata....

Read More

Healthcare

The Cost Of A Data Breach: The Health Care Perspective

The best-known provision of the Health Information Technology for Economic and Clinical Health Act of 2009 (“HITECH”) was the amendment of the Health Insurance Portability and Accountability Act of 1996 to provide for the promulgation by the U.S. Department of Health and Human...

Read More

Recent Cybersecurity Video