The healthcare sector lags behind the financial sector when it comes to the maturity of vendor risk management programs, a new study confirms. Risk management experts Rocco Grillo and Gary Roboff analyze the work yet to be done.
A dozen well-known cryptographers and information security specialists have published a paper explaining why they believe it's unfeasible to create a so-called "backdoor" to allow law enforcement to decrypt encoded information.
Covered entities find it difficult to prevent unauthorized access to patient data by members of their staffs. Preventing breaches involving insiders at business associates can be even trickier, as an incident affecting Meritus Health illustrates.
Italian surveillance software maker Hacking Team has confirmed that it was hacked and recommends police, law enforcement and government agencies suspend their use of its software, pending a full breach investigation.
OpenDNS's Andrew Hay sees danger confronting many enterprises in the era of the "Internet of Things" as Internet-ready consumer devices, not architected for security, find their way onto corporate networks, often unbeknown to administrators.
Enterprise mobility management suites are the glue that connects mobile devices to their enterprise workflow. End-user computing leaders must consider short-term and long-term objectives amid rapid market changes.
Download this matrix to explore how the market leaders compare.
Infrastructure and operations (I&O) professionals face a difficult mandate: Enable the workforce to navigate the ever-changing landscape of mobile scenarios while continually ensuring that their company's compliance and security needs are met. Mobile device management (MDM) solutions are effective tools to help...
The market for enterprise mobile management software has evolved from a primary focus on MDM to a suite that includes MDM, MAM and MCM as the primary capabilities. This Aragon Research Globe reviews 18 major technology providers in EMM and their strengths and challenges as this market transforms.
Download this...
Organizations of all shapes and sizes around the world have been faced with an influx of mobile devices over recent years. The increasing processing power and affordability of smartphones and tablets means that business users want to and are easily able to use them as part of their everyday working lives: Ovum's...
Content management is at a crossroads. More content is being accessed and shared on mobile devices than ever before. There has been a lot of focus on sharing files, but mobile content management (MCM) goes further to look at the spectrum of content and how it can be managed in the cloud, on mobile devices and in some...
Mobility is transforming enterprises at an unprecedented rate with the continued proliferation of smart devices, explosive development of mobile apps and increased access to work files. Employees are empowered by their organizations to be more productive at any time and from anywhere, adopting policies for Bring Your...
As more people use mobile devices to work, what are the key elements of an Enterprise Mobility Management (EMM) solution that successfully allow content creation, editing, sharing, syncing and pushing to mobile devices? We'll answer that question as well as provide industry specific scenarios and tips to help you...
Hacking Team, an Italian vendor of "easy-to-use offensive technology" that it sells to government agencies, has been hacked. Leaked customer lists reportedly name the FBI and DEA, plus the governments of Bahrain, Russia and Sudan, among others.
The increasingly sophisticated cyberthreats facing healthcare are making privileged access management more critical, says Sudhakar Gummadi, CISO at Molina Healthcare, a managed care company.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.