Ira "Gus" Hunt, a security expert who was formerly CTO at the CIA, analyzes why many large healthcare provider organizations plan to boost cybersecurity spending in 2018 and discusses the role of emerging technologies.
Today's business climate is one of unprecedented regulatory growth, data complexity and cybersecurity concerns. There is a corresponding increase in media attention, customer awareness and Board-level scrutiny.
Organizations must demonstrate that they have a viable process for managing risk and compliance (broadly...
Most organizations have embraced more than one software platform to automate their critical business processes. Platforms are becoming more flexible, allowing users to customize or configure their own applications. As your use cases grow, you may question whether you should leverage an existing platform for your next...
Today's business climate is one of unprecedented regulatory growth, data complexity and cybersecurity concerns. There is a corresponding increase in media attention, customer awareness and Board-level scrutiny. Organizations must demonstrate that they have a viable process for managing risk and compliance (broadly...
The ongoing struggle to protect sensitive credit card data will continue to escalate. One of the requirements used to tackle this problem is the Payment Card Industry Data Security Standard (PCI DSS). However, one of the biggest challenges for PCI DSS compliance initiatives is treating the standard as a unique and...
As enterprises continue to outsource more aspects of their operations to third parties, they expose themselves to more shared risk. It can be a staggering responsibility. Most organizations understand the need to automate vendor risk management activities to keep up with increasing scope and scrutiny. Yet they...
We've witnessed companies across industries suffer serious reputational and financial damage due to legal and regulatory compliance failures. Most had what they considered reasonable compliance processes, but somehow they didn't work. More and more corporate resources are spent on compliance, with greater attention in...
In today's global marketplace, business leaders must not only deal with well-understood challenges - competition, increasing regulation and sustained volatility - but also the need to maintain profitability and growth in a world defined by rapidly-evolving disruptive technologies. Today, the value proposition of...
Starting with the 2007-9 financial crisis, which exposed the fallacy in the idea that any market participant is "too big to fail", banks and their traders have recognized a need to get smarter about counterparty credit risk. As a result, concepts such as credit valuation adjustment (CVA) have evolved from a useful...
Uncertain times and a volatile economic climate have contributed to an expanding focus on corporate governance, risk, and compliance (GRC) across all industries. While some companies have met their risk and compliance challenges head on with insightful business strategies and powerful technology solutions, many are...
The old ways of implementing security and compliance mandates are no longer acceptable and the risk of high profile breaches has never been greater. With increased pressure on budgets, fewer resources and increasingly frequent audits, you need to find new ways to close security loopholes and reduce the window of...
Exploiting vulnerabilities in applications, browsers, and operating systems is often the first step in compromising a target. But despite increased investment, security and risk professionals continue to struggle with remediation. A new analyst report takes a look at the current state of vulnerability risk...
Mobile capture is quickly becoming an important differentiator for many companies and organizations, especially those in traditionally document-intensive fields like banking, insurance, healthcare and government operations. According to a 2014 study conducted by AIIM, 45% of companies feel that mobile capture is...
The regulatory environment means that monitoring what information leaves your organization is as vital as protecting it from external attacks. Email is one of the most likely routes by which data may leak, maliciously or more often accidentally. A successful Data Leak Prevention system will address the issue of email...
Organizations collect a wealth of information as part of their governance, risk and compliance programs, and security professionals are missing out on important insights if they don't take advantage of it.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.