Patient Portal Puts a Spotlight on Secure Messaging


Stage 2 requires expanded use of patient portals, as well as implementation of secure messaging, allowing patients to exchange information with physicians regarding their health care. Given the Health Insurance Portability and Accountability Act (HIPAA) requirement for secure communication of Protected Health Information (PHI), a spotlight has been placed on the support for secure messaging. Secure Messaging Requires Authentication and Secure Networks.

Prepare for The Cyber Threat : What Executives Need to Know to Manage Risk


FBI Director James Comey consistently underscores the threat of cybercrime to corporate America by repeating what security professionals have long known: “there are two kinds of companies in the United States, those who know they have been hacked and those that don’t know they have been hacked.” Conducting a holistic review of the organization to identify areas of vulnerability and improve network security is a proactive measure that no organization should overlook.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Internet Two Seeks Chief Cyberinfrastructure Security Officer


Chief Cyberinfrastructure Security Officer. Position Summary: The Internet2 Chief Cyberinfrastructure Security Officer (CCSO) is the leader responsible for establishing the cyberinfrastructure security strategy and direction for Internet2′s global infrastructure programs. The CCSO provides leadership for the Internet2 cyber security program through strong working relationships and collaboration across the staff and community, including policy and operational areas.

Cyber Catalyst Brings Minimal Value To Businesses

Forrester's Customer Insights

cybersecurity information security Insurance security & risk CyberinsuranceIn late March, Marsh announced the launch of a program with a number of leading cyberinsurance firms including Allianz, AXA, Beazley, XL, and Zurich to evaluate cybersecurity products and services. Products that meet a minimum standard of criteria receive the designation of “Cyber Catalyst” for their effectiveness in reducing cyber risk. The intent is for […].

Impact of technology on insurance industry

Hacker Earth

Like every other industry, the global insurance sector, worth over $5 trillion, has undergone an immense overhaul because of disruptive technologies in recent years. Admittedly, the insurance industry (risk, premium, claims) has been slow to keep pace with digitization and are only slowly beginning to grasp the power of becoming more customer-centric and offering faster response times, increased transparency. IT security (53%). How many use chatbots in the insurance industry?

Your 2018 Guide To Cyberinsurance Is Here!

Forrester's Customer Insights

Forrester’s 2018 Guide To Cyber Insurance Today, no one is 100% secure – believing otherwise is hubris of Icarian proportions. This reality is a core reason why more organizations are turning to cyber insurance. cybersecurity governance risk & compliance (GRC) information security Insurance risk management security & risk security performance management CISO cyber insurance cyber risk Cyberinsurance

InfoSec Policies and Standards: Some strategic context for those just diving into this world


Organizations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs to be considered. So an organization makes different strategies in implementing a security policy successfully. An information security policy provides management direction and support for information security across the organization. Policies can be enforced by implementing security controls.

Cloud Computing and Security: Do You Know Where Your Data Is?

CIO Dashboard

Understandably, security is weighing heavy on the minds of CIOs as they shift to the cloud. In PwC’s new video series on cyber security , my colleague, Harshul Joshi , and Ralph Pyne , CISO, Zinio Systems, discuss the most important thing that companies need to do before they make the leap to the cloud. On the flipside, according to Pyne, we need the same level of information from our cloud providers as we do our own internal systems.

How and When to Quantify Information Risk


Most people think of risk quantification as the practice of assigning a dollar value to information risk, but even ranking different types of risk into an ordinal scale (first, second, third, etc) involve a degree of quantification. While most situations call for less precision, there are some information risk topics in which a more rigorous and quantified approach is appropriate, not least to justify Information Security’s reasoning for choosing one strategy over another.

Top Actions From Gartner Hype Cycle for Cloud Security, 2020


Organizations may no longer question its utility, but security remains a commonly cited reason for avoiding it. In reality, the public cloud can be made secure enough for most uses. Here are three technologies from the Gartner Hype Cycle for Cloud Security, 2020, to action right now.

Winter ’19 Brings Exciting Changes to Salesforce Health Cloud


In this latest update, Salesforce is including a whole new object model to support Health Insurance services. Health Insurance Data Model. This new model promises to deliver functionality to help organize and make access to patient information more efficient than ever before. Learn more about the Health Insurance Data Model. New pagination functionality now allows you to easily show more information when a Patient Card contains more than ten records.

Ransomware Attack Hits Carnival Cruise Corporation: What We Know

SecureWorld News

Securities and Exchange Commission, notifying the SEC of the data breach. Promptly upon its detection of the security event, the Company launched an investigation and notified law enforcement, and engaged legal counsel and other incident response professionals.

NY regulation aims to raise bank security standards

Network World

Next week, New York State will begin a 45-day public comment period on its new financial industry cybersecurity regulation -- and, so far, security experts have a favorable view of the proposal. Under the new regulations, banks and insurance companies doing business in New York State will need to establish a cybersecurity program, appoint a Chief Information Security Officer and monitor the cybersecurity policies of their business partners.

Fed Tech News Roundup 8 July 2015


Information Security: Cyber Threats and Data Breaches Illustrate Need for Stronger Controls across Federal Agencies, July 08, 2015 GAO Info Security (Today) - What GAO FoundFederal systems face an evolving array of cyber-based threats. Securities and. However, more recent network information going back to late May could be. GAO: Financial Orgs Need Better Security Analytics and Threat Intelligence ThreatBrief (Today) - A new report from the U.S.

Top 10 Quotes About Cloud Security

SecureWorld News

Are you looking for relevant quotes about security in the cloud to help frame your thoughts or frame a discussion on the topic? We are happy to pass along top cloud security quotes from SecureWorld regional security conferences and digital platforms, like our webcasts and podcasts.

The Best Free Antivirus Software for Windows 7-10


Information Technology Blog - - The Best Free Antivirus Software for Windows 7-10 - Information Technology Blog. In any case, the sudden rise of the substantial scale ransomware disease demonstrated to us some unquestionable security escape clauses in Microsoft’s fan top choice. Fundamentally, a lot of clients set aside the way that the obsolete Security Essentials can manage a plenitude of the regularly developing virus risk. Security

Federal Government Signals Interest In Several Key Leading Edge Technologies


One of the federal government’s key procurement arms, the General Services Administration (GSA), has released a survey to the tech community in the form of a request for information asking a few simple questions regarding the experience of their vendor base. As technologists we found the questions informative and insightful and even inspiring (it was great seeing the government prove they are tracking developments in the tech world). By Bob Gourley.

Self-service: From the living room to the enterprise


Individuals also can arrange insurance with one click. Health records can be viewed securely from any device in the world with a web connection. This approach also should yield a more secure environment because organizational department leaders know better than the IT department which staff members should have access to what to be able to perform their daily tasks. By Robert Doswell. It’s now common practice to perform a variety of banking tasks from home.

Game Change: Three Reasons Why #SonyHack Will Change Security


The White House declares it’s a national security issue and leaks intelligence that North Korea is behind the attack. Most corporate hacks we see are focused on either customer data (credit cards, medical records, social security numbers, passwords, bank account information, email addresses) or company proprietary documents. In a field that is still in its infancy — Information Security — the #SonyHack I believe will emerge as a Game Change moment.

Supplier Management: The Good, the Bad, and the Solutions

SecureWorld News

Co-written by Glenn Kapetansky, Chief Security Officer at Trexin. The cloud can be at least as fast, secure, compliant, and even cost effective as on-premise IT , but won't achieve any of those objectives if managed the same way.

FDIC’s View of Cybersecurity and Lessons Learned For All Industries


Information security is pertinent to all businesses in all industries and across all levels of government. This post dives into an organization that is recovering from the fail side of the equation, the Federal Deposit Insurance Corporation (FDIC). In this case the target was not data that could be sold on the dark net, but was the type of policy information that would benefit a nation. In this case, there was a distinct lack of cyber-security efforts and reporting.

Expanding the Cloud – The Second AWS GovCloud (US) Region, AWS GovCloud (US-East)

All Things Distributed

Federal Information Security Management Act (FISMA) Low, Moderate, and High baselines. Department of Justice's Criminal Justice Information Services (CJIS) Security Policy. The AWS GovCloud (US) environments also conform to commercial security and privacy standards such as: Healthcare Insurance Portability and Accountability Act (HIPAA). Payment Card Industry (PCI) Security.

Enterprise IT Security: The Wake-Up Call is Getting Louder

The Investing Edge

I attended two local industry events recently that highlighted the substantial gap that exists between hackers’ abilities and the average corporation’s information security defenses. While we’ve been watching the security industry closely and work with several portfolio companies in this area, it’s nonetheless unsettling how far behind the average corporation is, and how daunting the chasm is between where they are and where they need to be.

The New Cybersecurity Threat Landscape

CIO Dashboard

In the last few months researchers and security experts have pulled off a series of technology demonstrations that should send a chill down the spines of senior executives and push cybersecurity up the list of priorities. Defacing websites, stealing customer data and holding information hostage will look like child’s play in comparison to recent bone-chilling demonstrations in the domain of the Internet of Things. Cloud Computing and Security: Do You Know Where Your Data Is?

The Sony Hack in Context


The good news for the moment is that the North Korean attack on Sony Pictures is in the headlines and has the nation discussing cyber security issues. Indeed, penetrations of corporate information systems are so widespread, persistent and severe that government agencies and cyber security firms such as Symantec independently estimate America is losing “hundreds of billions” of dollars in intellectual property per year. National Security Risks. By Chris Mellon.

Security vs Compliance | Hacking In To Cybersecurity

Linux Academy

Our previous posts in this series have focused on informing you, the reader, on how to land a job in the cybersecurity career field , but we’re going to switch gears in this episode and talk about something that every security professional needs to understand: Does Compliance equal Security? Security Defined. ” I love this definition because it addresses all of the things that a security program needs to be. Security vs Compliance.

27 New Cybersecurity Measures In Approved Defense Bill

SecureWorld News

27 of the information security provisions come directly from Cyberspace Solarium Commission (CSC) recommendations for improving US cybersecurity posture. The bill also includes new qualifications for becoming Director of the Cybersecurity and Infrastructure Security Agency (CISA).

What has NIST done for me lately?

Cloud Musings

According to a study, 82 percent of federal IT professional respondents reported that they were using the NIST (National Institute of Standards and Technology) cybersecurity framework to improve their security stance. The survey also demonstrated that the document is being used as a stepping stone to a more secure government. In March of 2015, the National Cybersecurity Institute did a study of Chief Information Security Officers across multiple industries.

Dell 81

Class of 2017 Yearbook: The Premier 100 Technology Leaders

ComputerWorld IT Management

Birdsall Senior vice president of information services and chief medical information officer Cancer Treatment Centers of America. Daniel Bosman Managing director and associate vice president TD Securities. Michal Cenkl Director of innovation and technology, Center for Information and Technology Mitre. Abhishek Choudhary Manager, Information Systems Indian Oil. Department of Homeland Security. Valcamp Chief information security officer Avnet.