June 9, 2017

The business case for enterprise file sync-and-sharing tools

"Enterprise file sync-and-sharing tools can serve an important service for mobile environments that need to share and" collaborate on files...
Read More
June 7, 2017

Improving Patient Privacy, Workflow with HIPAA Compliant Forms

Cloud-based services are quickly becoming more common in healthcare, especially as organizations are trying to find HIPAA compliant ways of...
Read More
June 6, 2017

Analysis: Are HHS Cybersecurity Recommendations Achievable?

A new Department of Health and Human Services report to Congress containing more than 100 recommendations for how healthcare can...
Read More
June 5, 2017

Network Visibility Architectures: One Size Does Not Fit All

The term "network visibility" has been in the networking space for ages, but has never been as important or relevant...
Read More
June 2, 2017

ECM, at your service!

There was a time when just getting control of enterprise content was a big achievement—knowing where the content was, being...
Read More
May 31, 2017

Molina Healthcare investigates breach of patients’ data

Long Beach-based Molina Healthcare, a major insurer in Medicaid and state exchanges across the country, has shut down its online...
Read More
May 30, 2017

IT startup companies seek product advice from CIOs

A number of the companies participating in the MIT CIO conference's Innovation Showcase can point to CIOs as important sources...
Read More
May 24, 2017

Hospitals and GPs to be rated on data security after cyber attack

The healthcare inspectorate will beef up its scrutiny of the state of IT systems in hospitals and surgeries as the...
Read More
May 22, 2017

The encryption challenge: It is critical to take the attitude that data must be protected at source.

There are many encryption challenges in the tech world today, particularly as the importance of encryption as a fundamental, rather...
Read More
May 19, 2017

`Man-in-the-middle’ fraud: How to prevent it, who is at risk, and what to do when it all goes wrong

What is `man-in-the-middle' fraud? A form of fraud, colloquially known as a `man-in-the middle' attack, has become increasingly common in...
Read More
1 8 9 10 11 12 27

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply

Your email address will not be published. Required fields are marked *