A soon-to-be-launched pilot project funded by the National Institute of Standards and Technology aims to provide a potential model for how online access to patient information can be streamlined while boosting security, NIST trusted identities expert Phil Lam explains in this audio interview.
Epic Systems' successful lawsuit against India's Tata Consultancy Services raises many security questions. For example, why did Epic find out about the allegedly inappropriate downloading of trade secrets from an external whistleblower, rather than as a result of internal detection efforts?
At a time when workers use more apps than ever to do their jobs - and from more locations and devices than ever - traditional IAM is simply not sufficient, says David Meyer, Vice President of Product at OneLogin. Cloud-Based IAM is what organizations truly need.
And it's a pretty simple business case to make, says...
Today's distributed enterprise faces two key challenges: Provide top-notch cybersecurity and ensure a seamless user experience. Paul Martini, CEO and co-founder of iboss Cybersecurity, discusses a new strategy designed to meet both goals.
The problem is that employees work everywhere today - at home, on the road,...
The massive "Panama Papers" data leak apparently was enabled by a law firm failing to have the right information security defenses in place. The breach calls attention to the need for all organizations to encrypt sensitive data, use access controls as well as monitor access patterns for signs of data exfiltration.
At a time when workers use more apps than ever to do their jobs - and from more locations and devices than ever - traditional IAM is simply not sufficient, says David Meyer of OneLogin. Cloud-Based IAM is what organizations truly need.
Healthcare is in the middle of a major evolution toward digital, personalized medicine and the empowered patient. Ongoing regulatory and monetary incentive programs are driving healthcare providers to increase their EHR and E-Prescribing adoption. Additionally, the U.S. Office of the National Coordinator for Health...
A watchdog agency's audit of the Department of Veterans Affairs makes nearly three dozen recommendations for how the VA should address "material weakness" in its information security program. The VA's CIO tells Congress all the issues raised will be addressed by the end of next year.
Best practice for the use and management of privileged accounts
is a topic that even experienced IT professionals find
complicated.
IT professionals need to ensure that important maintenance
and management tasks can be completed in a timely
manner, so they often share the passwords
for very powerful accounts...
Effectively managing privileged accounts (sometimes called
superuser accounts) is becoming more and more critical as
security and compliance emerge as the driving forces behind
most IT initiatives. Unfortunately, native tools and manual
practices for privileged account management are proving to be
inadequate for...
The world of identity and access management (IAM) is one
of constant change, shrinking deadlines, minuscule budgets,
overtaxed staff and unmerciful regulations. Unfortunately,
this historical approach to IAM involves piecing together "half
solutions" in hope that tomorrow's solutions will address real
world...
For many organizations, compliance with data security
standards doesn't seem to be getting easier. Although HIPAA represents
only a portion of the data security compliance obligations
faced by most organizations handling healthcare data, it
is one of the most significant.
Achieving and proving your
compliance...
One of the most important aspects of an identity and
access management (IAM) program is the securing,
management and governance of the accounts belonging
to superusers - privileged accounts.
These superuser
accounts require access management - ensuring that
admins have the access they need to do their job -...
For many organizations, compliance with data security standards doesn't seem to be getting easier. Although Sarbanes-Oxley Act (SOX) represents only a portion of the total scope
of compliance obligations faced by most organizations, it
is a critical piece of the compliance challenge.
Achieving
and proving your...
Privileged accounts are a necessity in any enterprise IT
environment, since they enable administrators to manage
the environment. But as news reports constantly remind
us, granting privileged access increases the risk of a security
breach, no matter what industry your organization represents.
However, your...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.