Privacy & Security

By 01:25 pm March 06, 2017
HIMSS Analytics survey, Healthcare IT Security and Risk Management reveals that while progress has been made in beefing up healthcare organizations' cybsecurity, much work remains.
By Thycotic 10:15 am February 28, 2017
2016 State PAM Report provides several recommended actions that healthcare organizations can take to help secure privileged credentials throughout their institutions. These recommendations represent a cross section of best practices for PAM security.
By 11:06 am February 27, 2017
Ransomware attackers collected over $209 million from victims during the first three months of 2016 alone, with the volume of attacks 10 times higher than all of 2015. Learn how to protect Your Organization From Today's Fastest Growing Cyber Threat.
By 11:05 am February 27, 2017
As organizations grow, so does their data and the risk of that data being breached. the latest research report from Osterman Research, Inc. which details their latest research into top IT organizations and their preparedness for a data breach.
By 11:05 am February 27, 2017
Sprawling data and a growing number of users needing access to sensitive information continues to challenge today’s enterprises. Addressing these issues without complicating your environment is key to an effective information protection program.
By SHI International 12:11 pm February 23, 2017
SQL Server 2016 is the latest addition to Microsoft’s data platform, with a variety of new features and enhancements that deliver breakthrough performance, advanced security, and richer, integrated reporting and analytics capabilities.
By 01:00 pm February 15, 2017
As healthcare providers innovate to provide more effective clinical tools and decision support, application management has become a critical challenge. Learn how to create a successful infrastructure that will support innovation while providing protection against application downtime.
Sponsored by
By Armor 10:59 am February 13, 2017
Unfortunately, many of today’s strategies fail to create a compelling case for action, undermining the CISO’s support and credibility. These six steps create an effective security strategy linked with key business interests and success factors.
Sponsored by
By Armor 10:56 am February 13, 2017
Balancing security and compliance requires a proactive strategy, starting with an understanding the importance of HIPAA compliance, surmising possible threats, and formulating policies that protect data while conforming to the necessary regulations.
Sponsored by
By Armor 10:29 am February 13, 2017
To avoid regulatory fines and a damaged reputation, healthcare organizations turn to a compliance checklist. But that alone doesn't ensure proper security. This whitepaper focuses on safeguarding sensitive data, the intention behind the regulations.

Most Read

The Daily Brief Newsletter