Privacy Resources

Privacy news and support resources, featuring the hottest solutions, technologies and vendors in the Privacy world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

Home Tag "Privacy"

The Top 5 Benefits of HIPAA Compliant Messaging that Improve Your Organization

Healthcare organizations process enormous amounts of sensitive data, including protected health information (PHI), every day. They are required by law through HIPAA (Health Insurance Portability and Accountability Act) to take every precaution to protect this data. As more of this communication goes mobile, it is critical that healthcare providers maintain the levels of privacy that […]

HIPAA Compliance: What You Need to Know

In our ever-evolving world, it is critical that those working in a healthcare environment and dealing with sensitive healthcare information take measures to ensure they are staying updated and compliant with HIPAA regulations. With the seismic shift towards the use of mobile devices in the healthcare industry, it is more important than ever for organizations […]

Is Docker’s built-in Security ‘Good’ Enough?

When deploying Docker containers into production here’s a frequently asked question: “Are the built-in security controls of Docker ‘good enough’ for my service?” There’s been quite a few posts recently assessing the security requirements for container deployments and taking a stand one way or another. A blog post on Docker’s blog asserts that “Your Software […]

VMware: Supporting Identity Federation with vCloud Air

As discussed yesterday, VMware is focused on helping IT to modernize their data centers by seamlessly integrating them with vCloud Air. A key aspect of integration is in extending the corporate IT infrastructure, specifically identity and access management, to vCloud Air. In this blog, I’ll share how vCloud Air supports identity federation to your preferred […]

Compliance in the Cloud: End User Security

HP Enterprise
It seems that every week we can turn on the news and hear about the latest cyber security breach. The irony is that so many of these breaches occur with companies and organizations that have very good information security programs with mature compliance / regulatory controls. So why are these breaches occurring? The simple answer: […]

Microsoft: Why enterprises trust Azure with their apps and data

It takes a lot to earn the trust of enterprise IT, and rightly so: software runs the operations of almost every business around the world. For Microsoft, earning your trust has been a multi-decade investment, not something we started after we got into the cloud business. Everything we’ve done to earn your trust over the […]

Compliance in the Cloud: Global Privacy Regulations

HP Enterprise
If you are paying attention to the news over the past few months, you probably heard something about the Safe Harbor and/or Privacy Shield regulations. You may have even heard a whole series of letters (GDPR) associated with it, but decided to change the channel and catch up on the latest Olympic or election coverage.  […]

Compliance in the Cloud: The Need for Compliance

HP Enterprise
This is the first blog in a series of blogs and podcasts that provides the information surrounding the concepts of compliance in a cloud environment. In this series, we will greater insight into the concepts and best practices for many of the considerations that are generally part of a cloud compliance program. In this installment, […]

Citrix: Surveys Show Businesses Need to Shift Away from Protecting Devices and Focus on Securing Apps and Data In All Stages

Citrix Systems
As organizations embrace the digital transformation of their business, they are increasingly facing new security concerns. A recent Citrix Qualtrics survey shows that more companies are moving away from device-centric, platform-specific endpoint security technologies toward an approach that secures their applications and data everywhere. The survey revealed that: More than half of Citrix customers reported […]

Cisco: Time is of the Essence: Announcing the Cisco 2016 Midyear Cybersecurity Report

It’s time again for our Midyear Cybersecurity Report (MCR), providing updates from Cisco security researchers on the state of security from the first half of the year. The 2016 MCR supplements the 2016 Cisco Annual Security Report published in January with mid-year analysis and insights on the evolving trends and threats across the industry. It […]

Advancing Healthcare Innovation Through High Performance Computing

We live in an incredible age for medical discovery and healthcare breakthroughs. With the advent of faster, low-cost genome sequencing technology, medical researchers can now understand the underlying genetic and molecular pathways for diseases. But as the technology enabling this era continues to advance at an astronomical rate, so too does the volume of data […]

Cisco: Research Innovations in Simple Usable Security

Every year the Symposium on Usable Privacy and Security brings together an interdisciplinary group of researchers and practitioners in human computer interaction, security, and privacy, to present and discuss the latest research in the areas of usable security and privacy. Cisco’s sponsorship of SOUPS supports student research and mentorship in this area (see below), as […]

4 Ways to Ensure Patient Privacy

Patient health information (PHI) is some of the most confidential information in the world, and that is why hackers are trying so hard to gain access to it. In this new era of healthcare mobility the majority of patient health information is becoming digital, and this ePHI requires the right technical and physical safeguards from […]

Terminal Server Logging on Workstations

When discussing Terminal Server logging, we are interested in monitoring user sessions connecting from a workstation. There is always a need for detailed reporting and keeping track of user activity and sessions when someone is running Remote Desktop Services session from a workstation. Many popular Terminal Server monitoring applications on the market today offer exhaustive […]

Visit Our Sponsors