Patient Portal Puts a Spotlight on Secure Messaging


Stage 2 requires expanded use of patient portals, as well as implementation of secure messaging, allowing patients to exchange information with physicians regarding their health care. Given the Health Insurance Portability and Accountability Act (HIPAA) requirement for secure communication of Protected Health Information (PHI), a spotlight has been placed on the support for secure messaging. Secure Messaging Requires Authentication and Secure Networks.

Internet Two Seeks Chief Cyberinfrastructure Security Officer


Chief Cyberinfrastructure Security Officer. Position Summary: The Internet2 Chief Cyberinfrastructure Security Officer (CCSO) is the leader responsible for establishing the cyberinfrastructure security strategy and direction for Internet2′s global infrastructure programs. The CCSO provides leadership for the Internet2 cyber security program through strong working relationships and collaboration across the staff and community, including policy and operational areas.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Prepare for The Cyber Threat : What Executives Need to Know to Manage Risk


Available data suggest that 84% of corporations have malware on their networks. FBI Director James Comey consistently underscores the threat of cybercrime to corporate America by repeating what security professionals have long known: “there are two kinds of companies in the United States, those who know they have been hacked and those that don’t know they have been hacked.” Building a Culture of Security: Do all our employees understand their role in cyber security?

Impact of technology on insurance industry

Hacker Earth

Like every other industry, the global insurance sector, worth over $5 trillion, has undergone an immense overhaul because of disruptive technologies in recent years. Admittedly, the insurance industry (risk, premium, claims) has been slow to keep pace with digitization and are only slowly beginning to grasp the power of becoming more customer-centric and offering faster response times, increased transparency. IT security (53%). How many use chatbots in the insurance industry?

InfoSec Policies and Standards: Some strategic context for those just diving into this world


Organizations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs to be considered. So an organization makes different strategies in implementing a security policy successfully. An information security policy provides management direction and support for information security across the organization. Policies can be enforced by implementing security controls.

FireHost is Now Armor: featuring an advanced linking intelligence, defense and control focused on customer outcomes


Editor's note: We have watched the market respond to the proactive, well engineered investment in information protection at FireHost, their years of work in enhanced security for customers has made them the market leading provider of highly secure cloud infrastructure. Now known as Armor, these offerings have been enhanced to deliver the best possible security outcomes to customers. - Armor delivers customers true security outcomes.

Top Actions From Gartner Hype Cycle for Cloud Security, 2020


Organizations may no longer question its utility, but security remains a commonly cited reason for avoiding it. In reality, the public cloud can be made secure enough for most uses. Here are three technologies from the Gartner Hype Cycle for Cloud Security, 2020, to action right now.

Federal Government Signals Interest In Several Key Leading Edge Technologies


One of the federal government’s key procurement arms, the General Services Administration (GSA), has released a survey to the tech community in the form of a request for information asking a few simple questions regarding the experience of their vendor base. As technologists we found the questions informative and insightful and even inspiring (it was great seeing the government prove they are tracking developments in the tech world). By Bob Gourley.

Top 10 Quotes About Cloud Security

SecureWorld News

Are you looking for relevant quotes about security in the cloud to help frame your thoughts or frame a discussion on the topic? We are happy to pass along top cloud security quotes from SecureWorld regional security conferences and digital platforms, like our webcasts and podcasts.

Game Change: Three Reasons Why #SonyHack Will Change Security


The White House declares it’s a national security issue and leaks intelligence that North Korea is behind the attack. Most corporate hacks we see are focused on either customer data (credit cards, medical records, social security numbers, passwords, bank account information, email addresses) or company proprietary documents. The #SonyHack is the equivalent of detonating a nuclear bomb on a network that employed four key stratagems: capture, destroy, extort, and publish.

Self-service: From the living room to the enterprise


Individuals also can arrange insurance with one click. Health records can be viewed securely from any device in the world with a web connection. Using a self-service portal, for instance, employees can request their own access to applications, network shares, functional mailboxes and distribution lists. The request must be evaluated and after approval, the IAM software ensures that the request is processed immediately in the network. By Robert Doswell.

The Sony Hack in Context


The good news for the moment is that the North Korean attack on Sony Pictures is in the headlines and has the nation discussing cyber security issues. Indeed, penetrations of corporate information systems are so widespread, persistent and severe that government agencies and cyber security firms such as Symantec independently estimate America is losing “hundreds of billions” of dollars in intellectual property per year. National Security Risks. By Chris Mellon.

Supplier Management: The Good, the Bad, and the Solutions

SecureWorld News

Co-written by Glenn Kapetansky, Chief Security Officer at Trexin. The cloud can be at least as fast, secure, compliant, and even cost effective as on-premise IT , but won't achieve any of those objectives if managed the same way.

Amazon’s Halo tests the limits of personal privacy, and offers a glimpse of the future of health


I’ve informed the Amazon team of a feature request from my wife, who would like to receive an emailed report on my tone of voice at the end of each day. And then also helping customers understand how to take action against the information provided in the service, as well.

7 technologies that CIOs can’t ignore in 2021

mrc's Cup of Joe Blog

Secure portals. With the sudden shift to a remote work environment, many employees didn’t have a secure way to access important files, applications, employee calendars, etc… Companies adopted solutions to bypass these issues, but many were temporary fixes rather than long-term solutions.

27 New Cybersecurity Measures In Approved Defense Bill

SecureWorld News

27 of the information security provisions come directly from Cyberspace Solarium Commission (CSC) recommendations for improving US cybersecurity posture. The bill also includes new qualifications for becoming Director of the Cybersecurity and Infrastructure Security Agency (CISA).

Class of 2017 Yearbook: The Premier 100 Technology Leaders

ComputerWorld IT Management

Birdsall Senior vice president of information services and chief medical information officer Cancer Treatment Centers of America. Daniel Bosman Managing director and associate vice president TD Securities. Michal Cenkl Director of innovation and technology, Center for Information and Technology Mitre. Abhishek Choudhary Manager, Information Systems Indian Oil. Department of Homeland Security. Valcamp Chief information security officer Avnet.