Compliance

After Sentinel 7.3 was released, the Rules and Action options were changed, and it got a little trickier to set up automatic emails to notify security team members about things like login failures. Here’s how you set things up to enable a “Send Email” action to be part of routing actions.

May 27, 2015
4:10 pm
Reads:
1,289
Score:
Unrated

At a recent speaking engagement, I shared the successful results of our most recent Common Criteria certification efforts. After being congratulated by a member of the audience, we proceeded to have the following discussion: Audience member: “When are you going to be done with SP800-53 certification?” Me: “Huh? Which part of it?” Audience member: “All…

+ read more

Michael Angelo
Jan 8, 2015
9:33 am
Reads:
3,703
Score:
5

This post reminds me of the very early days in my career as an application developer on a Medicare claims processing system. I took on the responsibility of a large subsystem implementation that year where I was responsible for the requirements definition, specification and subsequently the testing of the new subsystem, Medicare Secondary Payer (MSP). Why the…

+ read more

Jul 24, 2014
7:39 pm
Reads:
14,321
Score:
5

The signs are all there.  It’s time to get serious about complying with the Health Insurance Portability and Accountability Act (HIPAA) Security and Privacy Rules.  Are you compliant yet?  If not, the U.S. Department of Health Human Services (HHS) wants you to know that tolerance for noncompliance with HIPAA regulations is lower than ever before. …

+ read more

Kent Purdy
Jan 22, 2014
8:44 am
Reads:
56,431
Score:
Unrated

Compliance is the legal framework within which an organization must abide if it is to remain within the law; almost every enterprise decides that to willfully ignore the law is not an option for long-term viability. Closely allied to risk management, compliance management requires a framework, a set of standard processes that guide those responsible…

+ read more

David Shephard
Jan 7, 2014
12:44 pm
Reads:
2,021
Score:
Unrated

I have spent the last couple of weeks working with one of our partners with regards to a solution encompassing of technology and services to meet the most immediate requirements for their healthcare customers.It also provided an opportunity to do a little research on our current healthcare customers and solutions that they subscribe to using…

+ read more

Jul 29, 2013
4:14 pm
Reads:
2,234
Score:
5

2013 Prediction: Threat detection and management will be required to monitor continuously and in business context with regard to level of risk. Given the rapid change, information requirements, environment complexity, growing devices, explosive data growth and growing real-time analysis requirements accessing that data, risk of threats to the organization is growing exponentially. It will no…

+ read more

Nov 20, 2012
9:02 am
Reads:
3,311
Score:
Unrated
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Migrating from Windows XP or 2003 to SUSE Linux Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow