Patient Portal Puts a Spotlight on Secure Messaging

CTOvision

Stage 2 requires expanded use of patient portals, as well as implementation of secure messaging, allowing patients to exchange information with physicians regarding their health care. Secure Messaging Requires Authentication and Secure Networks.

How Microsoft Word “Protected View” Stops Information Leaks

Perficient - Digital Transformation

Microsoft Word has long offered support for loading images and templates over the network. This often means that the document will look incomplete, because the user is only able to see a preview of the document without any of the content that is linked to a network location.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Information Risk: How APIs are Making Security Governance Easier

CEB IT

But now information risk teams are automating security governance by providing security capabilities via micro services and APIs. This automation approach offers multiple types of security components to developers. Information security teams are taking different paths.

Edge security: There’s lots of attack surfaces to worry about

Network World

The problem of edge security isn’t unique – many of the issues being dealt with are the same ones that have been facing the general IT sector for decades. Yet, by applying basic information security precautions, most edge deployments can be substantially safer. More about edge networking. How edge networking and IoT will reshape data centers. How edge computing can help secure the IoT.

Edge security: There’s lots of attack surfaces to worry about

Network World

The problem of edge security isn’t unique – many of the issues being dealt with are the same ones that have been facing the general IT sector for decades. Yet, by applying basic information security precautions, most edge deployments can be substantially safer. More about edge networking. How edge networking and IoT will reshape data centers. How edge computing can help secure the IoT.

E-book: Educate Yourself With Dell Insight Partner Views on Cybersecurity

Cloud Musings

Data security breaches and hacker attacks on private businesses , health organizations and government agencies in the U.S. Some see these breaches as a threat to national security and in response, the U.S.

Want to change the world? ‘Secure’ the Next Killer App in IoT

The Investing Edge

Security remains a major concern. Given the massive amount of data that is being collected today (Merritt says this has grown from terabytes to petabytes daily) how do we keep information secure and who owns it is once it is collected?

The new rulers of the cybersecurity realm: Automation, Analytics Artificial Intelligence

Network World

It may be a brave new world in 2017 but it’s also a darn scary one for IT security professionals. READ MORE ON NETWORK WORLD: 5 enterprise technologies that will shake things up in 2017 + Just take a look at some recent Gartner assessments of the security situation: By 2020, 60% of digital businesses will suffer major service failures, due to the inability of IT security teams to manage digital risk.

Steps for Performing a Cyber Security Assessment

Galido

Information Technology Blog - - Steps for Performing a Cyber Security Assessment - Information Technology Blog. A chief information security officer for reviewing network architecture. Privacy officer to help with locating personally identifiable information.

Industry leaders set cloud computing security benchmarks

Cloud Musings

Security has long been the No. This latter scenario has been driven by the lack of industry consensus on security and a dearth of nonvendor specific cloud security training and certifications. A specific example of strong industry cloud security capabilities is Dell SecureWorks.

Guidance Software Federal Summit 6 March 2014

CTOvision

Recognized as a pioneer in the field of classified information protection, Mr. Bigman developed technical measures and procedures to manage the nation’s most sensitive secrets. Mr. Bigman is now an independent cyber security consultant and president of 2BSecure LLC in Bethesda, Maryland.

April Intro | Roadmap to Securing Your Infrastructure

Linux Academy

Why do I bring up car care when this is an information security blog? More secure passwords. The individual topics for this month are: More Secure Passwords. Security challenges. Our end goal in this is to get C-level buy-in on secure password practices.

National Cyber Security Hall of Fame Announces 2015 Inductees

CTOvision

14, 2015 /PRNewswire/ -- The National Cyber Security Hall of Fame has released the names of five innovators who will be inducted into the Hall of Fame at its award ceremony on Thursday, October 29 , at the Four Seasons Hotel in Baltimore, Maryland. He leads Microsoft's Security Development Lifecycle team and is responsible for its corporate strategies and policies for supply chain security and for strategies related to government security evaluation of Microsoft products.

Hotels 148

When Big Data Changed Security - Chuck's Blog

Chuck's Blog - EMC

An IT industry insiders perspective on information, technology and customer challenges. When Big Data Changed Security. This morning, EMC announced a new landmark product: RSA Security Analytics. Information has quickly become the most critical enterprise asset. 

Industry leaders set cloud computing security benchmarks

Cloud Musings

Security has long been the No. This latter scenario has been driven by the lack of industry consensus on security and a dearth of nonvendor specific cloud security training and certifications. A specific example of strong industry cloud security capabilities is Dell SecureWorks.

Top Ten Ways Not To Sink the Kubernetes Ship

Linux Academy

To ensure ongoing security site reliability engineers must work hand-in-hand with the CISO’s (Chief Information Security Officer) office to implement Kubernetes security. It is important to use security tooling such as OpenSCAP, the open source version of the Security Content Automation Protocol, to harden virtual machine images prior to their deployment in virtual private clouds. Implement Pod Security Policy. Implement Network Policies.

Fed Tech News Roundup 8 July 2015

CTOvision

The Army, therefore, is planning to further incorporate the open VICTORY network development standard. Information Security: Cyber Threats and Data Breaches Illustrate Need for Stronger Controls across Federal Agencies, July 08, 2015 GAO Info Security (Today) - What GAO FoundFederal systems face an evolving array of cyber-based threats. Securities and. However, more recent network information going back to late May could be.

The Sony Hack in Context

CTOvision

The good news for the moment is that the North Korean attack on Sony Pictures is in the headlines and has the nation discussing cyber security issues. National Security Risks. The US military, by design, is more dependent on information technology than any potential adversary.

Defense in Depth: Protecting the Organization’s Data

CTOvision

Editor's note: in this post, Cognitio's Marty Meehan provides context on an economical, scalable and highly secure defense in depth solution leveraging PKWARE's Smartcrypt and QuintessenceLabs. - External security threats grow more sophisticated and unpredictable. Marty Meehan.

Federal Government Signals Interest In Several Key Leading Edge Technologies

CTOvision

One of the federal government’s key procurement arms, the General Services Administration (GSA), has released a survey to the tech community in the form of a request for information asking a few simple questions regarding the experience of their vendor base. As technologists we found the questions informative and insightful and even inspiring (it was great seeing the government prove they are tracking developments in the tech world). By Bob Gourley.