- Governance Risk and Compliance Management
eGestalt’s SecureGRC provides an end-to-end integration of Security monitoring with IT Governance, Risk and Compliance management software using a cloud based delivery model. It delivers an integrated solution for security & IT-GRC through an integrated dashboard
in Public bookmarks with and compliance compliance software governance it governance risk risk compliance by 4 users
- governance, risk and compliance
eGestalt’s SecureGRC provides an end-to-end integration of Security monitoring with IT Governance, Risk and Compliance management software using a cloud based delivery model. It delivers an integrated solution for security & IT-GRC through an integrated dashboard
in Public bookmarks with and compliance compliance software governance it governance risk risk compliance by 4 users
- governance, risk and compliance
eGestalt’s SecureGRC provides an end-to-end integration of Security monitoring with IT Governance, Risk and Compliance management software using a cloud based delivery model. It delivers an integrated solution for security & IT-GRC through an integrated dashboard
in Public bookmarks with and compliance compliance software governance it governance risk risk compliance by 4 users
- Hackers Exploit Opportunity-Execute Well-Planned Attack
While the hacker attacks on big banks generated headlines and attracted mass attention, hackers – this time from across borders, made the most of this opportunity to execute a well-planned attack of a much more serious nature.
in Public bookmarks with compliance hippa management posture risk security vendor
- Health Breach Tally Hits a New Milestone
A thousand incidents and counting, the federal health breach tally hits an all-time high, now listing 1,010 major breaches reported since federal regulators started to track them in September 2009 after the HITECH Act came into effect.
in Public bookmarks with assessment breach breaches compliance data encryption health hipaa risk security unencrypted
- Health Data – A Goldmine for Hackers
The latest incident involved the Vermont Health Connect where a cyber-attack seems to have taken place last December, with hackers accessing health data 15 times.
in Public bookmarks with aegify breach cyber-attack data encryption healthcare information manage management risk security
- HIPAA Audits- Timeline & Insights
The results of the 115 HIPAA compliance audits conducted as part of the pilot project last year are being evaluated, said Susan Mc Andrew of the Department of Health and Human Services’ Office for Civil Rights, and the HIPAA compliance audit program will not resume until after the current fiscal year ends.
in Public bookmarks with aegify and assessment audits hipaa management posture risk securegrc security
- HIPAA Omnibus Extends Compliance Liability down the Chain
The HIPAA Omnibus rule has made significant impact on the healthcare industry. It has created a complex chain of compliance liability for covered entities, their business associates and subcontractors, who are all now equally accountable for the protection of private health information, and responsible for the compliance conduct of their ‘downstream’ partners under certain circumstances, according to Data Security attorney Stephen Wu.
in Public bookmarks with aegify and compliance it management posture risk securegrc security
- HIPAA Omnibus Rocks the Health IT Security Landscape
With the release of Omnibus HIPAA privacy and security rule on January 17th this year, the health information security landscape is set to experience some major changes. Healthcare entities are facing the immediate need to conduct risk assessments and testing to meet HIPAA compliance requirements.
in Public bookmarks with aegify and compliance it management posture risk securegrc security
- Holistic Data Protection Solutions through Modular Approach
Technological innovations and enhancements when on one hand has given the enterprises wider scope and faster methods to manage the day-to-day operations, on the other hand has drastically changed the threat landscape.
in Public bookmarks with access data frameworks identity information management mobile protection risk security services solutions
- How Can BAs & Subcontractors Tackle the New Compliance Burden?
The HIPAA Omnibus rule has now brought business associates and subcontractors under its gamut, making it mandatory for them to comply with the requirements of the final rule, or face stiff penalties.
in Public bookmarks with aegify and compliance it management posture risk securegrc security
- How Physicians can Avoid HIPAA Penalties in 2015
In this article Aegify shares insights on the need to take protective measures and shares various ways to avoid HIPAA Penalties in 2015.
in Public bookmarks with 2015 assessments compliance continuous hipaa in management monitoring penalties risk security solution
- How to Do Security Risk Analysis and Management – Demystify, Understand and Implement!
Join us for an upcoming webinar on Oct 17, 2013 to understand the aspects of conducting security risk analysis for your business – and how to translate the results into terms that make sense in dollars.
in Public bookmarks with analysis and assessment compliance dollars federal grant hipaa it management managing risk risks securing security webinar
- How to hack through Phone Ring Test
As new technologies are coming up day by day, we tend to ignore the older ones. Taking advantage of this, attackers always try to make you a victim by getting access to the older technologies. Modem is one of these old age technologies, so beware!
in Public bookmarks with access application data identity information management management protection risk security frameworks
- How to integrate components of vulnerability risk into larger business risk using GRC tool
Vulnerability Assessment is more or less a standard activity across organization and across the globe for all large, small and medium enterprises. It is hygiene, compliance requirements or simple risk based approach to identify vulnerabilities both internet facing and internal systems and applications and patch them.
in Public bookmarks with application frameworks identity information management privileged risk security
- How to Manage Security Risk for your Business – Demystify, Understand and Implement!
Join us for an education webinar on Oct 8, 2013 and Oct 17, 2013 to understand the aspects of conducting security risk analysis for your business – and how to translate the results into terms that make sense in dollars.
in Public bookmarks with analysis and assessment compliance dollars federal grant hipaa it management managing risk risks securing security webinar
- How to Pen-Test Java Applet
This article discusses in detail the lesser known art of Pen-Testing Java Applets/Thick Client apps. Here I have explained in detail the process of Pen-Testing Java applets starting from how to go about intercepting data between an Applet and the remote server.
in Public bookmarks with access applet application data identity information java management management protection risk security frameworks
- How to Stop Gray Market Activities?
Whilst the majority is aware of the "black market", there still remain some gray areas about the term "gray market" and its implications.
in Public bookmarks with brand enterprise intelligence management protection risk sales trademark
- Identity & Access Management – Integral Part of an Enterprise’s Security
It is often said that a chain is only as strong as its weakest link. And when it comes to IT security in many enterprises, the weakest link is usually identity and access management. With the rise of information fraud increasing, it is time for enterprises to renew their focus on identity and access management (IAM).
in Public bookmarks with access data frameworks identity information management mobile privileged protection risk security services solutions
- Identity Access Management Empowering Global Business
Today global expansion has become the norm to stay in the aggressively competitive world, requiring enterprises to manage large consumer base and businesses to expand their transactions network.
in Public bookmarks with access data frameworks identity information management protection release risk secure solutions by 2 users
« Previous
Next »
risk from all users