Secure Configuration Manager

It’s impossible to tell with any precision if human error in IT is increasing, or decreasing. However, there is plenty of incidental data in the breach headlines of today to support the fact that human, or insider, error is prevalent – and not going away anytime soon. The Hack Heard Round the World For example,…

+ read more

Dec 22, 2014
9:41 am
Reads:
900
Score:
5

This post reminds me of the very early days in my career as an application developer on a Medicare claims processing system. I took on the responsibility of a large subsystem implementation that year where I was responsible for the requirements definition, specification and subsequently the testing of the new subsystem, Medicare Secondary Payer (MSP). Why the…

+ read more

HudnallsHuddle
Jul 24, 2014
7:39 pm
Reads:
12,905
Score:
5

It’s a fact that today’s emerging IT delivery models, such as Cloud, Mobile, BYOD, and Social, are driving immense complexity in your IT infrastructure.  At the same time, you are faced with increasing diversity in the types of threats you face daily.  A quick scan of the headlines reveals that insider attacks remain unchecked, accidental…

+ read more

Renee Bradshaw
Feb 24, 2014
8:59 am
Reads:
1,043
Score:
Unrated

Targeted attacks, often referred to as Advanced Persistent Threats (APTs), are notoriously difficult to explain and define. And the containment of targeted attacks is even more daunting given the fact that a single product cannot do it. Almost everyone universally believes that targeted attacks do not have a technical solution. Targeted attacks are not new;…

+ read more

lhilal
By: lhilal
Feb 12, 2014
2:03 pm
Reads:
1,573
Score:
Unrated

Despite steady investments in security, ever larger data breaches continue to dominate the news. Increasing IT complexity, driven in part by cloud, mobility, and social identity, continue to make the job of security teams even harder. A recent survey of 763 IT security decision makers and practitioners across North America and Europe conducted by CyberEdge…

+ read more

Renee Bradshaw
Feb 6, 2014
1:56 pm
Reads:
1,457
Score:
5

The signs are all there.  It’s time to get serious about complying with the Health Insurance Portability and Accountability Act (HIPAA) Security and Privacy Rules.  Are you compliant yet?  If not, the U.S. Department of Health Human Services (HHS) wants you to know that tolerance for noncompliance with HIPAA regulations is lower than ever before. …

+ read more

Kent Purdy
Jan 22, 2014
8:44 am
Reads:
54,817
Score:
Unrated

Compliance is the legal framework within which an organization must abide if it is to remain within the law; almost every enterprise decides that to willfully ignore the law is not an option for long-term viability. Closely allied to risk management, compliance management requires a framework, a set of standard processes that guide those responsible…

+ read more

David Shephard
Jan 7, 2014
12:44 pm
Reads:
1,064
Score:
Unrated