enterprisesecuritymag

healthcare

Predictions For Artificial Intelligence and Virtual Reality
Enterprisesecuritymag >> cxoinsights

Artificial intelligence (AI) and virtual reality (VR) are two cutting-edge technologies that already have influenced the private and business sector and continue to do the same. It has become crucial for businesses to be up to date on cutting-edge...

Implementing Software-Defined Everything in the Data Center
Enterprisesecuritymag >> cioviewpoint

Jim Livingston, CTO, University of Utah Health

Healthcare organizations demand the highest level of data center security, performance and automation. In 2016, I realized that we had an aging infrastructure to support four hospitals and 10 community clinics. It was time to make a change, but I...

The Importance of Conforming to HIPAA for Healthcare Entities
Enterprisesecuritymag >> cioviewpoint

Randall Frietzsche, CISO, Denver Health

If you are a US-based healthcare entity, and you electronically bill for your services, you probably fall under HIPAA regulations. HIPAA requires encryption to protect patient data. This article will discuss the key points of this requirement....

Significance of Cloud Security in Businesses
Enterprisesecuritymag >> cxoinsights

Cloud technology has been under scrutiny by both critics and experts. Cybercrime industry has hindered the adoption of the technology, but experts still believe that it is more secure than any other private communication and IT network linked to...

The Rising Demand for Standardization in Healthcare
Enterprisesecuritymag >> cxoinsights

Marc Probst, CIO, Intermountain Healthcare

The acceleration of standards development in healthcare informatics adds value to both efficient healthcare delivery, as well as the national economy. Currently, there is a lack of proper data standards in the healthcare industry, as opposed to...

AI-Powered Healthcare: Balancing Expectations with Data and Privacy
Enterprisesecuritymag >> cxoinsights

Tanya Thouw, Senior Global Operations Manager Healthcare, SAP

Imagine a doctor’s appointment without a wait time of 40+ min­utes, redundant paperwork, and repetitive questions. Instead, the doctor hits a button and pulls up your entire medical history, includ­ing hereditary risks and findings...

Importance of Embracing Cloud Computing To Enhance Security
Enterprisesecuritymag >> cioviewpoint

Cloud computing has undoubtedly taken over the market when it comes down to data integration, processing, and management of late. Although cloud computing is gaining momentum, in the present scenario it is not free from the clutches of jeopardy...

Achieving Information Security in Healthcare
Enterprisesecuritymag >> cioviewpoint

Dan Costantino, CISO, Penn Medicine

Owing to the growing concerns of patient data security, it’s indispensable for the healthcare experts to reassess their information security programs on a continual basis as it matures. It is critical to scrutinize whether you have...

Keeping Data Secure as Information Moves to the Cloud
Enterprisesecuritymag >> cxoinsights

Tommy Richardson, Former CTO of ADP and Chief Technology Officer and SVP of Technology, Nextech's

Data breaches happen every day as hackers infiltrate companies’ computer systems to gain access to private content, such as financial data and protected health information. We’ve all seen the headlines: Yahoo in 2014 with 3 billion...

Healthcare Cybersecurity: Start with a Plan
Enterprisesecuritymag >> cxoinsights

William Phillips, Sr. VP & CIO, University Health System, San Antonio, Texas

Today’s healthcare landscape continues to become more complex each day. The CIO’s role is ever-expanding with additional responsibilities. At the top of this list is the protection and security of the systems and data of the...

Conquering Endpoint Security Challenges
Enterprisesecuritymag >> csoinsight

Brian Thomas, CIO, Swope Health Services

1) What do you see as a big challenge in technology to meet the challenges of your industry? If you were to write down a wish list, what solutions do you look forward to and your expectations from technology providers for the enterprise? The...

The Future of Cyber Security Defense: Make Way for Bots
Enterprisesecuritymag >> csoinsight

Carl Herberger, VP Security Solutions, Radware

This summer, the SEC indicted a group of 32 hackers and rogue stock traders for hacking into various Newswire services and stealing press releases before they were publically released. They earned north of $100M from insider trading. This scheme...

The Future of Cyber Security Defense: Make Way for Bots
Enterprisesecuritymag >> csoinsight

Carl Herberger, VP Security Solutions, Radware

This summer, the SEC indicted a group of 32 hackers and rogue stock traders for hacking into various Newswire services and stealing press releases before they were publically released. They earned north of $100M from insider trading. This scheme...

A Deeper View into the Threat Landscape
Enterprisesecuritymag >> cioviewpoint

James Carder, CISO & VP of LogRhythm Labs

The threat landscape hasn’t really changed except for a few minor adjustments. We are still seeing nation state threat actors, financial crime groups, hacktivism (though that has been receiving less press lately), terrorist organizations...

A Deeper View into the Threat Landscape
Enterprisesecuritymag >> cxoinsights

James Carder, CISO & VP of LogRhythm Labs

The threat landscape hasn’t really changed except for a few minor adjustments. We are still seeing nation state threat actors, financial crime groups, hacktivism (though that has been receiving less press lately), terrorist organizations...

Countering Cyber Vulnerabilities & Threats
Enterprisesecuritymag >> cxoinsights

Roota Almeida, CISO, Delta Dental of New Jersey

Cyber Insurance and the Threat Landscape In the recent years, the threat landscape has significantly changed and will continue to do so. In the near future, healthcare and health insurance industry will continue to be a prime target for...

Meeting Security And Compliance Requirements Throughout The Enterprise, Including BYOD management
Enterprisesecuritymag >> vendor

Lee Powe,CIO,Hugh Chatham Memorial Hospital

Challenges in technology to meet enterprise needs in 2013 and expectations One of the major challenges is meeting security and compliance requirements throughout the enterprise, including BYOD management. Another major challenge is obtaining...

The Future of Cyber Security Defense: Make Way for Bots
Enterprisesecuritymag >>

Carl Herberger, VP Security Solutions, Radware

This summer, the SEC indicted a group of 32 hackers and rogue stock traders for hacking into various Newswire services and stealing press releases before they were publically released. They earned north of $100M from insider trading. This scheme...

The Future of Cyber Security Defense: Make Way for Bots
Enterprisesecuritymag >>

Carl Herberger, VP Security Solutions, Radware

This summer, the SEC indicted a group of 32 hackers and rogue stock traders for hacking into various Newswire services and stealing press releases before they were publically released. They earned north of $100M from insider trading. This scheme...

Virtis: Mitigating Data Breach with Cutting-Edge Solutions
Enterprisesecuritymag >>

Michelle Wilner, CEO

The company provides globally unique, leading-edge patented products and services combined with a boutique white-glove approach to their clients