Virtualization and cloud computing adoption are elevating the importance and complexity of an age-old problem: effectively managing and protecting passwords for privileged accounts. Managing and protecting privileged credentials is
essential to reducing risk and addressing compliance
requirements. Organizations need...
Organizations handling transactions involving credit or debit cards are facing increasing pressure to comply with the Payment Card Industry Data
Security Standard (PCI DSS) version 3, which established
various requirements for safeguarding an organization's relevant systems and networks, comprising the
Cardholder...
To not only survive in the application economy, businesses are undergoing a digital transformation in which they
add digital components to all of their products and services. This
means having to develop for and integrate with a variety of APIs,
microservices, cloud applications and infrastructures-...
Files may be secure within a network using perimeter-based solutions. They may even remain secure during transit using encryption technologies. But what happens once recipients obtain and decrypt those files? How do you keep information secure as the file gets passed around or downloaded onto a flash drive? How can...
Despite the frequency of healthcare data breaches, only half of U.S. hospitals have the infrastructure to support two-factor authentication, according to a new report. Plus, some information security leaders say implementation of the technology at many of those facilities is likely relatively narrow.
Today's cybercriminals are aware of the fraud prevention technologies deployed by most financial institutions, and they design attacks to circumvent these controls. Transaction anomaly detection and device ID approaches can be highly inaccurate, generating a large number of false positive alerts that can overwhelm IT...
This $2 billion manufacturer - with customers in the nuclear, defense, aerospace and power generation industries - chose Thycotic Secret Server to secure and manage their privileged account passwords across its global enterprise.
Download this case study to learn:
Why privileged account management is a major...
This free Privileged Password Security Policy Template gives you best-practice policies to help your organization improve IT security and demonstrate regulatory compliance. You'll save hours of effort leveraging these policies that are easily customizable in a matter of minutes.
Downloaded as an editable, easily...
Pediatric hospitals face an assortment of ID and access management challenges when managing Web portals that provide access to patient data, says Cris Ewell, CISO at Seattle Children's Hospital.
In the wake of hacker attacks, which have left healthcare providers uncertain about what security steps to take, the Office of the National Coordinator for Health IT is working to help organizations sort out role-based identity and access management issues, says ONC's privacy officer, Lucia Savage.
An inspector general's memo that highlights three significant information security deficiencies that have plagued the U.S. Department of Labor for the past five years points out problems that most federal agencies confront.
Human resources departments can play an important role in helping to prevent insider breaches, says Reid Stephan, IT security director at St. Luke's Health System. In an interview, he describes his organization's strategy.
Misusing data access privileges can pose a threat to the integrity of an organization's IT systems and the privacy of individuals. But gray areas exist, and it's not always clear cut when "unofficially" accessing protected data means users are abusing their privileges.
The increasingly sophisticated cyberthreats facing healthcare are making privileged access management more critical, says Sudhakar Gummadi, CISO at Molina Healthcare, a managed care company.
What's your digital identity strategy? Numerous agencies in countries across Europe - such as the Italian postal service - are creating new approaches to verifying identities and allowing them to be used as a trusted service, says CA's Paul Briault.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.