Organizations looking at implementing encryption should consider taking a unified approach, says Karen Scarfone, who coauthored NIST's encryption guidance. Learn about her other recommendations.
Healthcare organizations signing new deals with vendors, including many cloud services providers, must make sure that their business associate agreements reflect the new HIPAA Omnibus Rule's requirements.
Because data stored in a cloud-based "sandbox" environment for testing purposes is vulnerable, it should be masked to protect sensitive information, says Karen Hsu of Informatica.
The growth in cloud computing and mobility is creating a need for a streamlined, centralized process for managing user authentication, says Sarah Fender of PhoneFactor.
Next-generation threats require a next-generation firewall. Steve Pao of Barracuda Networks discusses his company's new firewall solution and the new levels of protections it offers.
Given the expanse of mobility and the cloud, traditional identity and access management solutions no longer suffice. It's time for a complete business-driven IAM solution, says Jason Garbis of Aveksa.
Most organizations are challenged by having too much information in too many places. But Dieter Schuller of Radiant Logic says centralizing data can improve identity management.
Barracuda Networks announces the release of a firewall designed to meet the needs of small and mid-sized organizations. Read more about this and other news releases issued at RSA Conference 2013.
Russ Dietz of Websense likes to ask organizations: Do you really know who has access to your data? The answers often lead to uncovering security vulnerabilities that have been overlooked.
Advanced threats require an advanced security strategy. Oliver Friedrichs of Sourcefire recommends a threat-centric security approach. In this interview, he explains exactly what that entails.
Paige Leidig, chief marketing officer of CipherCloud, says information protection requirements continue to be the primary hurdle for enterprise adoption, despite explosive growth in the cloud content and collaboration market and its evident advantages to productivity and cost efficiencies.
Outsourcing to the cloud poses new risks, especially for card data. The PCI Council addresses those risks in its just-released cloud security guidance, and Bob Russo offers exclusive insights.
As enterprises move more applications to the cloud, continuous monitoring will play a greater role in assuring the software is patched in a timely manner, says John Streufert, DHS director of federal network resilience.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.