The increasingly sophisticated cyberthreats facing healthcare are making privileged access management more critical, says Sudhakar Gummadi, CISO at Molina Healthcare, a managed care company.
What's your digital identity strategy? Numerous agencies in countries across Europe - such as the Italian postal service - are creating new approaches to verifying identities and allowing them to be used as a trusted service, says CA's Paul Briault.
The norm today is a set of customers with multiple identities that interact with your brand across many channels. With that comes the challenge of serving that customer with a fluid experience across every channel.
We're just beginning to get the customer experience right across all of the different channels we...
The Target breach was the hot topic for many RSA 2014 attendees, but Gartner's Avivah Litan was already talking about the next Target - a UK retailer that may have suffered a similar hack, exposing payment card data.
The identity world circa 2015 still operates in stovepipes -- mobile, API, and web identities are often managed and secured using separate processes and technologies. The holy grail for the future of identity is a single standards-based federated Identity and Access Management (IAM) system with a high degree of...
Preventing patient record "snooping" is an ongoing challenge for hospitals in their HIPAA compliance efforts. But with the intensifying attention on Ebola cases, hospitals need to up their game in protecting patient privacy.
The development of authentication technologies that could replace the password is "nearing a tipping point," but there's still several years of work to do, says Jeremy Grant, who oversees the National Strategy for Trusted Identities in Cyberspace.
Private equity firm Veritas Capital will acquire BeyondTrust, a cybersecurity software company, from venture capital firm Insight Venture Partners. Financial details of the acquisition were not disclosed.
Senior leaders are often faced with tough budget decisions. That's why winning support for an investment in an identity and access management tools requires painting a clear picture of the value to the business.
Customers increasingly use digital channels to interact with organizations. But these interactions raise new security concerns that must be addressed by IAM solutions, says David Gormley of CA Technologies.
Gemalto plans to acquire SafeNet, a data and software protection provider, for $890 million to help reinforce its identity and access management business. The deal is expected to close by year's end.
The Department of Health and Human Services inspector general has criticized HHS for failing to implement security controls on the system that provides computerized access to physical facilities and computer networks.
A critical step in the successful implementation of role-based access control at healthcare organizations is first committing to do time-intensive prep work, says security expert Christopher Paidhrin of PeaceHealth.
Customers increasingly use digital channels to interact with organizations. But these interactions raise new security concerns that must be addressed by IAM solutions, says David Gormley of CA Technologies.
Fraud Summit - San Francisco 2014 - The hackers get the headlines, but behind the scenes the stealthy insiders continue to pose huge fraud risks to banking institutions. And often the fraudsters are senior, trusted employees with privileged access to accounts and competitive data. Register for this session to learn...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.