OCR Releases Guide for HIPAA and the Cloud

OCR Releases Guide for HIPAA and the Cloud

What is the goal when a breach report is investigated by the Office for Civil Rights? Jocelyn Samuels, Director of the HHS Office for Civil Rights (OCR), has said that the intent is not limited to identifying the cause of the breach.

Shadow IT Creates Dangerous Data Silos

Shadow IT Creates Dangerous Data Silos

Given the amount of corporate data stored in the cloud, public cloud apps have become a top Shadow IT risk for businesses. How have cloud storage apps become so popular in the enterprise?

State CIOs Can Take a Leadership Role in Data Security

State CIOs Can Take a Leadership Role in Data Security

The role of Chief Information Officers (CIOs) at the state level of government is changing. As the responsibility of IT purchasing shifts to business units and end users, CIOs are having to juggle new technology demands, opportunities and risks.

NIST Releases Draft Guide on Mobile Security Threats

NIST Releases Draft Guide on Mobile Security Threats

NIST has released a draft report and guide on the security vulnerabilities associated with endpoint devices. Along with this guide, NIST has opened its draft mobile security threats catalogue for public comment.

The Impact of Corporate Data Loss from Mobile Devices

The Impact of Corporate Data Loss from Mobile Devices

Companies are haemorrhaging data from the endpoint, and there is no single, clear cause behind this steady flow. According to a new survey by NetEnrich, Corporate IT Hounded by Mobile Security Concerns, 42% of IT pros said their organizations suffered key corporate data loss from a mobile device.

Executive Endpoints Are Increasingly At Risk

Executive Endpoints Are Increasingly At Risk

The data on employee endpoints—like laptops, mobile phones, and tablets—is at risk. While theft due to malware is a perennial risk, endpoint data is also at risk of theft through email, cloud storage, and device theft.

Yahoo Breach Underscores Need for Automated Security Tools

Yahoo Breach Underscores Need for Automated Security Tools

The recent data breach disclosed by Yahoo is set to be a game changing event. Already, the breach has had immediate repercussions both for Yahoo, potentially putting its Verizon acquisition at risk, and for other organizations.

A Look Inside Absolute MTM for Chromebooks Web Filtering

A Look Inside Absolute MTM for Chromebooks Web Filtering

Absolute MTM for Chromebooks Web Filtering lets you to re-allocate your time and effort. Find out what you can expect from Absolute MTM for Chromebooks Web Filtering.