A Congressional proposal that would allow HHS to offer technical assistance to private-sector efforts aimed at solving the problem of matching the right records to the right patient could pave the way for a significant breakthrough, says Lynne Thomas Gordon, CEO of AHIMA, which represents records professionals.
Adoption of cloud applications and infrastructure is increasing. As a result, IT teams are expected to be experts in evaluating their features and capabilities. Deep knowledge of redundancy, global infrastructure, and SLAs has also become business critical. However, there is one section in the cloud service provider's...
Today's organization needs to provide its employees, partners, applications and even networks access to its data and IT environment regardless of how they access it. But trying to maintain security and compliance in this increasingly complex hybrid IT world becomes a challenge - particularly if those solutions end up...
The Department of Veterans Affairs is in the midst of an IT transformation that spotlights security efforts ranging from enforcing the use of two-factor authentication to reducing privileged access accounts, says a new mid-year report.
Privileged users are typically associated with a company's IT department and can include database administrators, network engineers, IT security practitioners, etc. However, across an organization there may be other privileged users that should not be overlooked. A privileged user can be anyone from account managers...
In recent months, Cloud Access Security Broker solutions have emerged as a defacto, mandatory control.
Rohit Gupta founded Palerra in 2013 with a vision of enterprises embracing the cloud. And that's happened. But with cloud ubiquity has come a new reality, he says.
"Enterprises recognize that there is a...
A mass password reset by Citrix-owned GoToMyPC shows how online service providers are still grappling with the fallout from recent large data breaches.
The maturity of the network access control (NAC) market presents organizations with a strong selection of vendors that offer evolved capabilities. Enterprises are prioritizing low-level complexity of administration, flexibility of controls, ease of integration, and competitive product pricing as the main selection...
Pulse Policy Secure is a complete guest access management solution and simplifies an organization's ability to provide secure, differentiated guest user access to their networks. The Guest Access feature enables a guest/contractor to access a special Self-Registration URL and create their own guest account for...
Identity-Powered security solutions work by integrating identity information with security monitoring, providing the security intelligence needed to detect and respond to anomalous activity that signals a data breach or compliance gap. Today's Identity and Security Management solutions should provide visibility and...
Identity and access management should empower businesses, satisfying customers and other stakeholders who need secure access to an enterprise's data and systems, says security expert Jeremy Grant, former leader at the federal government's National Strategy for Trusted Identities in Cyberspace.
With hack attacks continuing against banks, SWIFT must follow in the footsteps of other vendors - notably Microsoft - and begin offering detailed, prescriptive security guidance to its users, says Doug Gourlay of Skyport Systems.
Nearly every major breach over the last three years - including Anthem, Target, Home Depot, Office of Personnel Management, the Internal Revenue Service, the National Security Agency - shared a crucial commonality: attackers gained entry using compromised or stolen credentials.
This range of identity-centric...
Many financial institutions struggle with implementing effective multifactor authentication solutions. They may lack confidence in new methods or grapple with the difficulty of integrating newer technologies with legacy investments. So, what technologies and processes need to be in place to ensure MFA's adoption...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.