The search found 3768 results.
Blog
If you’re in the cybersecurity field, chances are you’ve come across Zero Trust architecture (or any variants of it) enough to know what Zero Trust means. Essentially, the Zero Trust cybersecurity approach is kicking old methods to the curb while embracing the basic principles of security.
Blog
In recent years, we have seen increased interest and adoption of machine learning (ML) and artificial intelligence (AI) technology in healthcare. Organizations have been piloting solutions that range from helping diagnose patients, to ensuring the privacy of their data. While the industry is beginning to see some benefits from these tools, many end-users are starting to ask important questions like: How does the tool work, or Where are my data stored?
Blog
Monitoring is the 5th element of the 7 elements of an effective compliance program. It is a continuous task that compliance and privacy teams must do to ensure any inappropriate accesses are detected and resolved in a timely manner.
Blog
Two recently published reports discuss the high cost of healthcare data breaches organizations can incur. The Department of Health and Human Services estimates that it takes a breached healthcare organization a full year to recover.
Blog
The National Institute of Standards and Technology (NIST) has released a request for information for the NIST Privacy Framework: An Enterprise Risk Management Tool ("Privacy Framework").1 The purpose of the privacy framework is to improve management of privacy risk, which is a major gap across healthcare organizations today.
Blog
Often when discussing common healthcare security threats, external breaches are the main focus. However, recent evidence shows those breaches are not the biggest concern to hospitals – they’re more concerned with breaches that can happen within their own halls, by their own internal staff. HIMSS Media recently conducted a study on behalf of SailPoint, and the consensus was that healthcare provider organizations are highly concerned with insider threats.
Blog
A recent ProPublica article highlighted how small-scale medical privacy breaches are causing harm across the nation. The impact of small-scale breaches is immense, but seems to garner comparatively little coverage as most data breach headlines focus on large-scale breaches involving hundreds if not thousands of medical records.
Blog
Gartner, Inc. recently released their “Market Guide for User and Entity Behavior Analytics”. Gartner provides an interesting take on a very hot topic in the security space across all industries in the modern day.
Blog
Remote access has become an irreplaceable tool for the success of many companies, but using it safely and securely is difficult.
Blog
The success of business projects and the associated technology solutions to implement them are almost always graded on how much return on investment (ROI) they deliver back to the business for the investment required.