How do companies in the healthcare industry better manage risk and keep their most valuable data safe when stolen healthcare information commands such a high price on the dark web? Download the case study, "Proactively Challenge Cyber Threats in the Healthcare Industry," to learn how this healthcare organization...
Passwords' days are numbered as businesses attempt to deliver a better user experience to their online customers, as well as apply better identity management practices, says CA's Paul Briault.
A new research project called Amnesia tackles the password management problem by not storing full data in any one place where it can be hacked. But does this proposed solution truly offer better password security?
Today's organization needs to provide its employees, partners, applications and even networks access to its data and IT environment regardless of how they access it. But challenges regarding identity management and device compliance can make it very difficult to be secure in this increasingly complex IT world -...
Along with DNS, digital keys and certificates are at the foundation of any layered cybersecurity defense. Moreover, keys and certificates are akin to HLAs (Human Leukocyte Antigens) because they serve as unique identifiers giving authorized users access to encrypted systems.
But vulnerabilities, such as Heartbleed...
A Congressional proposal that would allow HHS to offer technical assistance to private-sector efforts aimed at solving the problem of matching the right records to the right patient could pave the way for a significant breakthrough, says Lynne Thomas Gordon, CEO of AHIMA, which represents records professionals.
Adoption of cloud applications and infrastructure is increasing. As a result, IT teams are expected to be experts in evaluating their features and capabilities. Deep knowledge of redundancy, global infrastructure, and SLAs has also become business critical. However, there is one section in the cloud service provider's...
Today's organization needs to provide its employees, partners, applications and even networks access to its data and IT environment regardless of how they access it. But trying to maintain security and compliance in this increasingly complex hybrid IT world becomes a challenge - particularly if those solutions end up...
The Department of Veterans Affairs is in the midst of an IT transformation that spotlights security efforts ranging from enforcing the use of two-factor authentication to reducing privileged access accounts, says a new mid-year report.
Privileged users are typically associated with a company's IT department and can include database administrators, network engineers, IT security practitioners, etc. However, across an organization there may be other privileged users that should not be overlooked. A privileged user can be anyone from account managers...
In recent months, Cloud Access Security Broker solutions have emerged as a defacto, mandatory control.
Rohit Gupta founded Palerra in 2013 with a vision of enterprises embracing the cloud. And that's happened. But with cloud ubiquity has come a new reality, he says.
"Enterprises recognize that there is a...
A mass password reset by Citrix-owned GoToMyPC shows how online service providers are still grappling with the fallout from recent large data breaches.
The maturity of the network access control (NAC) market presents organizations with a strong selection of vendors that offer evolved capabilities. Enterprises are prioritizing low-level complexity of administration, flexibility of controls, ease of integration, and competitive product pricing as the main selection...
Pulse Policy Secure is a complete guest access management solution and simplifies an organization's ability to provide secure, differentiated guest user access to their networks. The Guest Access feature enables a guest/contractor to access a special Self-Registration URL and create their own guest account for...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.