How The Cloud Can Accelerate HITRUST Certification

August 6th, 2019 by jfinison

Sponsor: CloudticityPrimary topic: Privacy & SecurityTopic: Cloud ComputingPrivacy & SecurityResource Central: Upcoming WebinarsExternal url:…

Advancing Intelligent Identity Management

July 25th, 2019 by jfinison

Sponsor: SailPointPrimary topic: Privacy & SecurityTopic: Artificial IntelligencePrivacy & SecurityResource Central: Upcoming WebinarsExternal url:…

Cyber-Threats in Healthcare: Understanding and Protecting Against the Risks

July 23rd, 2019 by jfinison

Sponsor: ProofpointPrimary topic: Privacy & SecurityTopic: Privacy & SecurityResource Central: Upcoming WebinarsExternal url:…

A Balancing Act: Enforcing Cybersecurity While Improving Patient Engagement

July 18th, 2019 by jfinison

Author: LexisNexisSponsor: LexisNexisPrimary topic: Privacy & SecurityTopic: Patient EngagementPrivacy & SecurityQuality and SafetyResource Central: Upcoming WebinarsExternal url:…

Senators Scrutinize Facebook’s Cryptocurrency Plans

July 16th, 2019 by RSS Syndication

Democrat Sherrod Brown Calls Company ‘Dangerous’At a Senate committee hearing on Tuesday, lawmakers grilled a Facebook executive about the company’s plans to launch a cryptocurrency. One Democratic senator said Facebook “does not respect the power of t…

Will Cyberattacks Lead to Prolonged Conflicts?

July 16th, 2019 by RSS Syndication

There’s good news and bad news about the current state of cybersecurity, according to Richard A. Clarke and Robert K. Knake, two former federal advisers who have written a new book. Learn about their concerns that cyberattacks could escalate into prolo…

Insider Medicaid Fraud Case: ‘An Important Reminder’

July 16th, 2019 by RSS Syndication

Insider Threat a ‘Consistent Problem,’ a Legal Expert SaysThe sentencing of a former worker at a substance abuse treatment provider in connection with a Medicaid fraud conspiracy “is an important reminder about the threats from insiders,” one privacy a…

How a Big Rock Revealed a Tesla XSS Vulnerability

July 16th, 2019 by RSS Syndication

Bug Hunter Sam Curry’s Find Left Tesla Slightly Red-FacedSoftware vulnerabilities sometimes have an uncanny knack of revealing themselves, even when a bug hunter is looking someplace else. Sam Curry’s probing eventually revealed a cross-site scripting …

Adirondack Health Reports Breach Impacting 25,000 from March 2019

July 16th, 2019 by HealthITSecurity

Adirondack Health recently… read more

OnDemand Webinar | The Power of AI to Disrupt Security Ops

July 16th, 2019 by RSS Syndication

How utilizing AI can and will be realistic for any security organization…Learn about the concept of autonomous security driven by AI, probability theory and advanced algorithms in this exclusive webinar.