Blogs
DATA…DATA EVERYWHERE…NO SECURITY TO SPARE
According to our friends at the Ponemon Institute, 65 percent of info security pros would like to store object data…
By Ryan Tully on February 26, 2019
Data Security
Is Access Management Replacing Firewalls?
The landscape of the traditional perimeter security model is changing as many market segments, such as financial services, march toward…
By Ryan Tully on February 25, 2019
Sensitive Data
HIPAA Enforcement Update: Cracking Down on Blocking and Noncompliance
Two units of the Department of Health and Human Services (HHS) — the Office of the National Coordinator for Health…
By Ryan Tully on February 22, 2019
Compliance & Regulations
Healthcare Cybersecurity and Privacy Remain Top of Mind in 2019
HIMSS released a report focusing on healthcare cybersecurity trends for 2019 including electronic health records (EHR) and protected health information…
By Ryan Tully on February 21, 2019
Cybersecurity Data Privacy
7 Benefits of Making Data-at-Rest Part of Your Security Solution
It’s startling, but in 2017 more than 16 million Americans reported having their identities stolen. In response, federal and state…
By Ryan Tully on February 20, 2019
Sensitive Data
A Deep Dive into the Ohio Data Protection Act – Your Questions, Answered.
NOTE: While the webcast and our published materials are an analysis of this new law, they are not legal advice;…
By Ryan Tully on February 19, 2019
Compliance & Regulations