The rising cost of pharmaceuticals is an unfortunate reality that can render patients unable to afford medication. This struggle was evident to Dr. Michael Rae who created the Rx Savings Solutions app that helps consumers save on prescription costs. Dr. Rae is a medical expert, but since technology is not his forte,...
The Health Information Trust Alliance (HITRUST) began a search for a secure cloud solution for their Common Security Framework (CSF) application. CSF gives businesses the structure, detail and clarity needed to more efficiently and effectively meet healthcare regulatory compliance standards, including HIPAA.
The...
Cloud computing has already led to a fundamental shift in the enterprise computing paradigm, and security now needs to follow, says Gartner's Steve Riley, who shares recommendations.
Many healthcare organizations embark on cloud migrations to achieve scalability, cost-efficiency, and higher application performance. But migrating applications to the cloud can be a complex process, so maintaining HIPAA compliance and maximizing PHI security are always key considerations.
Download this white paper...
A bipartisan group of lawmakers has introduced legislation to encourage agencies to use secure cloud computing services as an alternative to continued reliance on legacy systems, which some government officials and IT security practitioners say puts data at risk.
Many healthcare organizations embark on cloud migrations
to achieve scalability, cost-efficiency, and higher application
performance. But migrating applications to the cloud can be a
complex process that requires careful planning and deliberation.
Maintaining HIPAA compliance and maximizing PHI security...
In the wake of the Hillary Clinton email controversy, organizations need to be more aware of the risks of unsanctioned "shadow IT" and take appropriate mitigation steps, says security expert Mac McMillan.
In recent months, Cloud Access Security Broker solutions have emerged as a defacto, mandatory control.
Rohit Gupta founded Palerra in 2013 with a vision of enterprises embracing the cloud. And that's happened. But with cloud ubiquity has come a new reality, he says.
"Enterprises recognize that there is a...
With today's connected enterprise and broad use of mobile devices, organizations are looking to keep their staff productive from wherever they are, while keeping data secure - hence the rise of intelligent key management. Increasingly, organizations are adopting Enterprise File Sync and Share (EFSS) and are using...
Data is the currency of the digital age and
the lifeblood of organizations, so strategies to protect
corporate data are growing in importance and are now
a topic of C-suite consideration.
In a recent survey conducted
by IDG Research Services, investing in cloud services
ranks as the second priority (55%)...
As a mid-sized or smaller organization, there is a lure of feeling safety in
obscurity. "We're too small to be a target for cyber attacks" is a common refrain
used to justify a lax network security posture. Unfortunately, it's a refrain that
may come to haunt you.
The truth is your company doesn't have to be...
In recent months, Cloud Access Security Broker solutions have emerged as a defacto, mandatory control. Which is better approach to CASB - proxy or API? Rohit Gupta of Palerra shares his insight and recommendations.
For its next move since jettisoning storage firm Veritas and becoming a pure-play security vendor, Symantec plans to buy network and cloud security firm Blue Coat from private-equity owners Bain Capital for $4.65 billion, gaining a new CEO in the process.
Cloud adoption promises the benefit of increased flexibility and significant cost savings. Hence, migrating business critical applications to the cloud is becoming a growing priority for companies of all sizes. This paper examines the root cause behind the confusion, some unfortunate real-world results due to the...
Increased agility enabled by cloud computing has created a "cloud first" strategic imperative for many organizations. Leveraging the power of cloud apps and on-demand infrastructure is essential for competitive advantage, if not parity, as is mitigating the associated risks and costs. However, existing security...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.