Compliance

After Sentinel 7.3 was released, the Rules and Action options were changed, and it got a little trickier to set up automatic emails to notify security team members about things like login failures. Here’s how you set things up to enable a “Send Email” action to be part of routing actions.

May 27, 2015
4:10 pm
Reads:
1,120
Score:
Unrated

At a recent speaking engagement, I shared the successful results of our most recent Common Criteria certification efforts. After being congratulated by a member of the audience, we proceeded to have the following discussion: Audience member: “When are you going to be done with SP800-53 certification?” Me: “Huh? Which part of it?” Audience member: “All…

+ read more

michaelfangelo
Jan 8, 2015
9:33 am
Reads:
3,424
Score:
5

This post reminds me of the very early days in my career as an application developer on a Medicare claims processing system. I took on the responsibility of a large subsystem implementation that year where I was responsible for the requirements definition, specification and subsequently the testing of the new subsystem, Medicare Secondary Payer (MSP). Why the…

+ read more

Jul 24, 2014
7:39 pm
Reads:
14,176
Score:
5

The signs are all there.  It’s time to get serious about complying with the Health Insurance Portability and Accountability Act (HIPAA) Security and Privacy Rules.  Are you compliant yet?  If not, the U.S. Department of Health Human Services (HHS) wants you to know that tolerance for noncompliance with HIPAA regulations is lower than ever before. …

+ read more

Kent Purdy
Jan 22, 2014
8:44 am
Reads:
56,276
Score:
Unrated

Compliance is the legal framework within which an organization must abide if it is to remain within the law; almost every enterprise decides that to willfully ignore the law is not an option for long-term viability. Closely allied to risk management, compliance management requires a framework, a set of standard processes that guide those responsible…

+ read more

David Shephard
Jan 7, 2014
12:44 pm
Reads:
1,895
Score:
Unrated

I have spent the last couple of weeks working with one of our partners with regards to a solution encompassing of technology and services to meet the most immediate requirements for their healthcare customers.It also provided an opportunity to do a little research on our current healthcare customers and solutions that they subscribe to using…

+ read more

Jul 29, 2013
4:14 pm
Reads:
2,146
Score:
5

2013 Prediction: Threat detection and management will be required to monitor continuously and in business context with regard to level of risk. Given the rapid change, information requirements, environment complexity, growing devices, explosive data growth and growing real-time analysis requirements accessing that data, risk of threats to the organization is growing exponentially. It will no…

+ read more

Nov 20, 2012
9:02 am
Reads:
3,218
Score:
Unrated
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Migrating from Windows XP or 2003 to SUSE Linux Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow