Privacy

The recent cyber attack on Anthem has vexed many victims and onlookers—and not just because Anthem had information on individuals who weren’t Anthem members. Many are asking why cyber attackers would want to steal healthcare records. Is information on someone’s health condition really that valuable? While some may not think so, as a victim of…

+ read more

Travis Greene
Aug 25, 2015
8:13 am
Reads:
2,652
Score:
Unrated

To the casual observer, the Internet of Things (IoT) is just an ultra-convenient world of smart devices and sensors that can communicate. But behind the shiny exterior of do-everything consumer devices is a vast expanse of data that has the power to change the world. To illustrate the power of data, let me tell you…

+ read more

GeoffWebb
By: GeoffWebb
Mar 12, 2015
7:14 am
Reads:
3,228
Score:
Unrated

Technology provides consumers the world at their fingertips, so it should come as no surprise that employees—who are really just consumers in disguise—insist on using their personal devices for work. The BYOD trend undoubtedly creates new opportunities and benefits for both employees and companies. But if it’s done wrong, BYOD can also frustrate employees and…

+ read more

Travis Greene
Feb 5, 2015
8:34 am
Reads:
4,340
Score:
Unrated

The signs are all there.  It’s time to get serious about complying with the Health Insurance Portability and Accountability Act (HIPAA) Security and Privacy Rules.  Are you compliant yet?  If not, the U.S. Department of Health Human Services (HHS) wants you to know that tolerance for noncompliance with HIPAA regulations is lower than ever before. …

+ read more

Kent Purdy
Jan 22, 2014
8:44 am
Reads:
57,767
Score:
Unrated

With the onset of a new year, it is prediction season again, and several NetIQ thought leaders have shared their identity, security and cloud insights. The emerging trends that have arisen in prior years like cloud, mobility, social and big data have been key challenges recently that are reflected in this year’s predictions. According to…

+ read more

David Shephard
Jan 17, 2014
9:27 am
Reads:
3,753
Score:
5

It’s prediction season again and I’ve written a piece for CSO Australia. Here’s how it starts…    “2013 was the year of Edward Snowden and the NSA spying revelations. We also faced a deluge of data breaches with an increasingly large amount of information compromised. The emerging trends that appeared on the radar in 2012…

+ read more

ianyip
By: ianyip
Dec 20, 2013
9:39 am
Reads:
5,186
Score:
Unrated

I know I have been quiet for the previous month, I took a little vacation and started becoming more attune to the discussion surrounding data, analytics, security, privacy and the value of our technologically connected world. First we have to rewind to the end of August when I had my first opportunity to discuss and…

+ read more

Oct 10, 2012
8:32 am
Reads:
3,894
Score:
Unrated

The European Union (EU) has always held personal rights and privacy in high regard, and in January it added 119 pages of proposed tough new regulations and penalties for businesses and government agencies that handle personal data. Every member of the EU has signed on to the European Convention of Human Rights, which protects each…

+ read more

David Shephard
Mar 9, 2012
10:37 am
Reads:
3,349
Score:
Unrated

Joe Tasker, former General Counsel of ITAA and VP of Government Affairs at Compaq, had attended a webinar that went over the newly published draft NIST Guidelines on Security and Privacy in Public Cloud Computing, and asked me what I thought. Lucky for me I just completed two blog posts for SC Magazine on issues with…

+ read more

Michael Angelo
Feb 10, 2011
1:22 pm
Reads:
4,147
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow