Five Ways the Health Care Industry can Improve its Cyberhealth with Better Hygiene

The health care industry has had a remarkably tough couple of years when it comes to security. Hacks of hospitals and health plans are now occurring almost daily, according to the U.S. Department of Health and Human Service’s online database. Over 100 million patient records were reportedly breached in 2015 — equivalent to a third...

The 5 Questions You Must Answer for Good Security Hygiene

We all know IT professionals move too frequently between fires. The demands of overly complex infrastructure, continual threats, and time-strapped IT Security teams mean leaders must go to where the smoke is, only occasionally stopping to ask themselves “Am I making any progress?” To begin to answer this question, you must start with another question…five...

Federal Agencies Should Use MEGABYTE Act to Enhance Their Cybersecurity

To protect your network, you have to know your network. This maxim is at the foundation of everything we do at Tanium. That’s why we were thrilled when, last month, the President signed into law a bill that will require federal agencies to do exactly that – get to know their network. The MEGABYTE Act...

You’re Going to Get Hacked. And Anti-Virus Won’t Save You.

The security industry is failing. Not failing to make money, of course: Gartner estimates worldwide industry spending will more than double by 2020. The failure, our failure as an industry, is that breaches continue to outpace the investment. Last year alone, budgets swelled 24%, while the number of security incidents rose 38%, according to PwC....

Caldicott’s health security reform fails to address basic cyber hygiene

The NHS treats more than 1 million people every 36 hours. These patients are often at their most vulnerable physically and emotionally, but so too are their digital selves. The health sector accounts for the most data security incidents in the UK  — more than 40% of all UK incidents in Q4 2015   — and regulators...

Back to the Basics: Detecting Malicious Windows Services with Tanium

“The theme I really want you to take away [from this presentation] is: if you really want to protect your network, you really have to know your network.” TAO Chief, NSA, USENIX Enigma 2016 An essential part of “knowing your network” is tracking endpoint persistence mechanisms – the myriad of ways in which an operating...

Only the Beginning

“There are three existential threats that can put us out of business today,” a CEO recently told me. “Meteors, nuclear war, and cybersecurity.” From boardrooms to living rooms, each of us feels the impact of data breaches. At Tanium, we know firsthand that point solutions, anti-virus tools, and strategies steeped in “hoping for the best”...

Seeing the Truth

The security industry is failing. Information Security spending is increasing year after year, yet breaches continue to outpace the investment. Last year budgets swelled another 24%, while the number of security incidents rose 38%.[1] When an entire system is spending more money only to realize the problem is getting worse, the system is broken. And...

Reducing Risk during Mergers & Acquisitions

A checklist to create cross-company visibility of all systems Mergers and acquisitions activity among the world’s largest companies has been on the upswing since 2014 with Dow and DuPont making headlines last week as the latest blockbuster merger, following names like Starwood and Marriott and AT&T and DirecTV. Acquiring companies face a long list of...