This Blog has Moved!

This blog is moving to


Thank you for visiting! Content will remain here for archival purposes.

7 Myths of Healthcare Cloud Security Debunked

The following is external content provided as a free resource for blog readers.
Even as cloud computing is increasingly adopted by healthcare organizations to host new workloads and applications, misconceptions still persist about the resilience and assuredness of cloud security. As clinical and business stakeholders consider moving functions to the cloud, they may continue to hear nagging doubts about cloud security and compliance. Most of these concerns are rooted in outdated or incorrect information, fear of change, and common myths.

If left unaddressed and unchallenged, these cloud security myths can rob a healthcare organization of a unique opportunity to reduce costs, improve infrastructure agility, increase reliability, and more. In fact, cloud security measures often exceed what healthcare organizations are capable of achieving.

Request Free!

Securing Health Data in a BYOD World

The following is external content provided as a free resource for blog readers.
In many ways, Bring Your Own Device (BYOD) sounds good to healthcare leaders. It can improve productivity, optimize practitioners' time and even reduce capital expenditures. But there's a flip side to BYOD that often sends shudders down the spines of healthcare IT executives and hospital administrators: As BYOD usage increases, so can security vulnerabilities.

Research studies reveal some startling statistics about the risk healthcare organizations face when implementing BYOD programs.

Consider these data points:
  • 39% of employees don't password-protect their mobile devices.
  • 52% access corporate information via unsecured WiFi networks.
  • 29% of organizations do nothing to manage applications on BYOD endpoints.
  • Only 24% of personal smartphones can be remotely wiped by a corporate IT department.
Finally, and perhaps most astonishing: Only 9% of organizations are fully aware of the devices accessing their network.

These risks may seem daunting, however, advancements in planning and technology are enabling healthcare organizations to deploy secure, HIPAA compliant BYOD initiatives that simplify and improve patient care while safeguarding PHI.

Request Free!

Space Weather Outlook September 28, 2015 at 01:33AM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #15-39 2015 September 27 at 11:22 p.m. MDT (2015 September 28 0522 UTC) **** SPACE WEATHER OUTLOOK **** Summary For September 21-27 Category R1 (Minor) radio blackouts were observed on 27 September due to flare activity from active sunspot Region 2422. Outlook For September 28-October 4 Category R1 (Minor) radio blackouts are likely through 03 October due to flare potential from active sunspot Region 2422. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

Exclusive Enterprise Security Kit (a $26.99 value) FREE for a limited time!

The following is external content provided as a free resource for blog readers.
Download this exclusive kit and you'll get sample forms and process flows, solutions to enterprise information security challenges, and a glimpse into the roadmap to success. You'll also receive an easy-to-follow reference for implementing information security in the enterprise.

This kit is important for decision makers as new business models are developed and enterprise security becomes increasingly important.

The following kit contents will help you continue your research on Enterprise Security:
  • Enterprise Security: A Data-Centric Approach
  • Detecting DDoS: Attacks with Infrastructure Monitoring
  • 15 Steps to Reducing Security Risks in Business Mobility
  • Gartner 2015 Magic Quadrant for Identity Governance and Administration


Request Free!

Determining Organizational Readiness to Support Employee-Owned Devices

The following is external content provided as a free resource for blog readers.
With more employees bringing their own IT equipment to work, businesses face key questions about supporting these new devices. What foundational policies need to be set? Which management tools can help both the user and the organization increase productivity? And what impact will these devices have on your data security?

This checklist will help you decide on the best approaches and processes to address your business's unique needs. In it, readers will gain fresh insight into:
  • Foundational policies for supporting employee devices
  • Tools and tips for managing the employee-owned device
  • Strengthening information security on devices storing corporate data


Request Free!

Space Weather Outlook September 21, 2015 at 02:31AM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #15-38 2015 September 21 at 12:15 a.m. MDT (2015 September 21 0615 UTC) **** SPACE WEATHER OUTLOOK **** Summary For September 14-20 R1 (Minor) radio blackouts were observed on 17 and 20 September due to flare activity from Regions 2415 and 2420. G1 (Minor) geomagnetic storm levels were observed on 14, 19, and 20 September due to coronal hole high speed stream influence, prolonged southward Bz, and coronal mass ejection (CME) effects from the 18 September CME. G3 (Strong) geomagnetic storm levels was observed on 20 September due to CME effects from the 18 September CME. Outlook For September 21-27 There is a chance for R1-R2 (Minor-Moderate) radio blackouts for the forecast period (21-27 Sep) due to flare potential from Regions 2415 and 2420. G1 (Minor) geomagnetic storm levels are likely on 21 and possible on 22-23 September due to CH HSS effects and a potential glancing blow from the 20 Sep CME, respectively. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

SEA-TAC Airport Enterprise Storage Strategy Fosters Sustainability

The following is external content provided as a free resource for blog readers.
The Seattle-Tacoma International Airport (SEA-TAC) is an environmental leader, and its administrators are always on the lookout for new technologies that help us meet their sustainable initiatives. SEA-TAC recently sought to upgrade its disparate and analog-based video surveillance systems into one fully merged IP-based solution. Their goals were to:
  • Reduce data center footprint and energy costs to foster sustainability
  • Establish storage platform for secure video data caption & protection
  • And more
This case study demonstrates how SEA-TAC developed a plan to migrate its video systems and deploy a centralized security management system. Read on here to deliver enterprise-class video surveillance IT infrastructure in a simple-to-deploy and scale-out appliance model.

Request Free!

Space Weather Outlook September 14, 2015 at 01:51AM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #15-37 2015 September 13 at 11:40 p.m. MDT (2015 September 14 0540 UTC) **** SPACE WEATHER OUTLOOK **** Summary For September 7-13 G1 (Minor) geomagnetic storm levels occurred on 07, 09, and 11 September with G2 (Moderate) levels on 07, 08, 09, 11 September and G3 (Strong) levels on 11 September due to a combination of coronal hole high speed streams and coronal mass ejection effects. Outlook For September 14-20 The geomagnetic field is likely to reach G1 (Minor) geomagnetic storm levels on 15 September due to coronal hole high speed stream effects. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

System Administration & Security - Salary & Skills Report

The following is external content provided as a free resource for blog readers.

Diverse and rapidly changing, network administration and security is the backbone of the 21st century workplace. What are the essential skills of the modern sysadmin? Does it pay to specialize, or go polyglot? Which tech is the overwhelming top pick in the world of configuration management?



Request Free!

Preparing for The New World of Data Privacy

The following is external content provided as a free resource for blog readers.
There is increasing global consciousness about data privacy today due to strengthening data privacy regulations around the world. News regarding the NSA's mass electronic surveillance data mining program (PRISM), large-scale surveillance practices by EU member states, highly publicized data leaks and thefts, and Bring-Your-Own-Device (BYOD) policies are bringing heightened awareness to this issue. Global corporations know they must adapt their IT infrastructure to support increasingly varied regional data protection regulations or face potential sanctions and/or legal repercussions, but not everyone knows exactly what is needed to operate in the new data privacy landscape.

Request Free!

15 Steps to Reducing Security Risks in Business Mobility

The following is external content provided as a free resource for blog readers.
Whether it's misplaced devices or hackers infiltrating your systems, the risk of data loss and theft posed by mobile computing has never been higher. The good news: Companies can protect their most valuable data by creating a security strategy that combines end-user training with intelligent policies and device selection.

This checklist gives SMB owners a handy guide for how to minimize risks and maximize the benefits of your mobile approach. You'll learn why it's crucial to:
  • Implement corporate tools for collaboration and file sharing
  • Enlist end users by helping protect their private data
  • Choose vendors with broad product lines
  • Select devices with two factor authentication


Request Free!

SOC Optimization

The following is external content provided as a free resource for blog readers.
This paper describes the persistent and evolving IT threat landscape, along with the need for and benefits of building an enterprise Security Operations Center (SOC).

Request Free!

10 Telltale Signs of Fraud

The following is external content provided as a free resource for blog readers.

Fraudsters are Finding New Ways to Take What is Rightfully Yours

Card-not-present (CNP) fraud weighed heavily on merchants over the past year costing over $32 billion[1] - a 33% increase in lost revenue[2] - and that’s just half the burden. Many merchants are paying in more ways than just fraud losses; for every $100 in chargebacks merchants lose $308 in wasted time, fees, penalties and/or loss of goods and services. So what can merchants do to prevent future fraud losses?

Detect and Stop Fraud with These 10 Telltales Signs

Get Verifi’s latest article, “10 Telltale Signs of a Fraudulent Order: How to stop chargebacks before they stop you” and gain insight into the most popular techniques that fraudsters use today, so you can stay one step ahead of fraudsters before they impact your profits.

Topics covered in the article:

  • Forecasts for CNP fraud
  • Impacts of fraud on CNP merchants
  • 10 signs of a fraudulent order


Request Free!

2015 Gartner Magic Quadrant for SIEM

The following is external content provided as a free resource for blog readers.
Gartner, Inc. has positioned IBM Security Systems as a leader in providing Security Information and Event Management (SIEM) software in the newly published Gartner Magic Quadrant for SIEM Technology.

Request Free!

IDC 2015 Trends: Why CIOs Should Rethink Endpoint Data Protection in the Age of Mobility

The following is external content provided as a free resource for blog readers.
This IDC Technology Spotlight examines the impact of mobile devices on business IT departments, particularly relating to data protection. This document assesses trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.

Request Free!

How To Cost-Effectively Manage The Security of Your Company's IT Infrastructure

The following is external content provided as a free resource for blog readers.
Functions of a managed security service include around‐the clock monitoring and management of intrusion detection systems and firewalls, overseeing patch management and upgrades, performing security assessments and security audits, and responding to emergencies. Products are available from a number of vendors to help organize and guide the procedures involved.

This guide is designed to help you decide whether your business needs the services of a managed computer security provider, and if so, how to choose the right vendor for your company.

To better understand your options, we'll also provide you with complimentary, no-obligation price quotes from top Managed Computer Security Providers based on your specific needs so that you'd be able to better compare the choices available to you.

Request Free!

Advanced Persistent Threats: Hijacking Insider Credentials

The following is external content provided as a free resource for blog readers.
Do you really know who's seeing the sensitive data on your network? Download the NetIQ Flash Point Paper Advanced Persistent Threats: Hijacking Insider Credentials to learn how someone with malicious intent might be able to get onto your network by impersonating your employees. In this paper, you'll learn:
  • How many IT professionals are worried about advanced persistent threats
  • Some techniques hackers use to get into networks
  • Questions to ask yourself about identity and access solutions
Don't be left in the dark, wondering who is on your network. Download this paper today.

Request Free!

Managing the Consumerization of IT

The following is external content provided as a free resource for blog readers.
Mobile technology has changed the corporate world forever. Users are determined to use their personal devices, causing a lot of security concerns for IT. Some solutions—like giving IT control or visibility into the device—are frustrating to users, but IT needs some control. Solve the problem with mobile access. In the NetIQ Flash Point Paper, Managing the Consumerization of IT: Mobile Access for the BYOD World, you'll learn:
  • Why current BYOD solutions don't really solve your problems
  • The reason so many BYOD policies fail
  • What to look for in a mobile access solution
Don't let the security risks and user frustration of BYOD policies continue. Read this Flash Point Paper today.

Request Free!

Contractor Access: Mitigating Security and Risk Issues

The following is external content provided as a free resource for blog readers.
Contractors introduce a unique challenge for businesses and for IT. Their contracts are limited, so you need to be able to quickly give them access to the right data, limit their access to other data, and ensure their access ends when their contract does. But how can you do that for all of them? In the NetIQ Flash Point Paper Contractor Access: Mitigating Security and Risk Issues, you'll learn:
  • The main causes of contractor risk
  • How to change your thinking about identity and access
  • Things to look for in an access solution
Giving access to contractors shouldn't mean exposing the organization to risk. Read this Flash Point Paper today.

Request Free!

2014 Cyberthreat Defense Report

The following is external content provided as a free resource for blog readers.
As trusted experts in cybersecurity, CyberEdge has provided the 2014 Cyberthreat Defense Report to illustrate the current security landscape and make near-future projections. In addition to attack statistics from North America and Europe, you'll learn where most IT professionals see weaknesses in their environment and how they plan to strengthen those areas. Some things you'll learn are:
  • Barriers to establishing effective defenses
  • Common host security misconfigurations
  • How BYOD is changing cybersecurity
Don't let cyberattacks get the best of you. Download this report today.

Request Free!

Is Your Identity and Access Governance Program Vulnerable to Risk?

The following is external content provided as a free resource for blog readers.
Your organization must inventory, analyze and understand the access privileges granted to its users to effectively manage risk. Proactive Identity and Access Governance (IAG) can help you answer the critical question: “Who has access to what, and is it appropriate?” NetIQ shows you how in this paper, which they've packed with:
  • Questions to help you determine if your program is proactive or reactive
  • Explanations of the challenges facing IAG programs
  • Things to look for in an IAG solution
Learn to secure your organization by implementing a proactive IAG program.

Request Free!

Mobile and Remote Access: Balancing Convenience and Security

The following is external content provided as a free resource for blog readers.
In today's BYOD world, securing access and maintaining productivity is challenging. Users want access from their own devices, and the applications, data and services they're using are not always secured by a perimeter. How can you provide secure access without inhibiting productivity? In this paper you'll learn:
  • How to take stock of your environment
  • How to leverage your current investments
  • What you can do to keep your access moving with the times
Get advice on choosing the right solution and the knowledge you need to face today's challenges.

Request Free!

Single Sign-On: with Passwords, Less is More

The following is external content provided as a free resource for blog readers.
Your workforce is using applications from a wider variety of sources than ever. Not only does this annoy your users, it's less secure. The solution is simply solved with enterprise Single Sign-On (SSO). Read this paper to learn:
  • Why you should consider SSO now
  • Some of your options in SSO solutions
  • Questions to help determine the right solution
Security and productivity are both at stake: put SSO to work in your organization today.

Request Free!

Space Weather Outlook September 07, 2015 at 12:44AM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #15-36 2015 September 6 at 10:34 p.m. MDT (2015 September 7 0434 UTC) **** SPACE WEATHER OUTLOOK **** Summary For August 31-September 6 G1 (Minor) geomagnetic storm levels were observed on 04 September due to coronal hole high speed stream activity. Outlook For September 7-13 R1 (Minor) radio blackouts are likely from 11-13 September as active sunspot Region 2403 returns on the visible side of the Sun. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

5 Tips for a Successful Bug Bounty Program Paper

The following is external content provided as a free resource for blog readers.

Most IT security spending focuses on minimizing the effects of an attack or a breach. Detection, mitigation, threat analysis and network defenses all have their place.  

However only finding bugs before they are exploited can prevent a breach from ever happening. Launching a bug bounty program has become a proven way that companies have been able to protect their users.

Simply put, bug bounty programs allow companies to offer rewards to hackers when the hacker is the first to find a bug. Running these programs is simple, but there are still best practices. HackerOne outlines some of they best ways to run a bug bounty program with little time and money while still getting great results.



Request Free!

Anatomy of a Healthcare Data Breach

The following is external content provided as a free resource for blog readers.
The stark reality all healthcare industry executives must face is that their organization will likely experience a data breach. The only questions are: When will it happen, how pervasive will it be, and how much will it cost them to remediate the problem?

Large breaches at organizations like Anthem Health, Community Health Systems and Advocate Medical Group represent a rapidly increasing number of healthcare organizations that have suffered expensive, disruptive, and embarrassing security problems.

Consider this starting fact: The healthcare industry represented 44% of all security breaches during 2013, making it the number-one industry for data breaches according to the Identity Theft Resource Center.

Why? A big reason is the economic value of patient data. Experts believe that Protected Health Information (PHI) is now worth 50 times more to hackers than credit cards or Social Security numbers, due to PHI's susceptibility to identity theft, fraud, and stolen prescriptions.

Read this white paper to learn what healthcare leaders can do about data breach.

Request Free!