Authorization

Problem solve

  • Why a healthcare SSO platform is a must-have

    By using the single-sign on product installed at their workplace, healthcare professionals can quickly log on to multiple applications without much hassle.Continue Reading

  • Ask the expert: HIPAA breaches and the tech most likely to cause them

    It's safe to say HIPAA breaches should be avoided at all costs. One CISO discusses the technology most likely to cause a breach and what to do to ensure compliance.Continue Reading

  • Forming a DR/BC plan for the inevitable data breach

    According to one statistic, as of July 2015 there were, in total, almost 4 million applications available on the app stores of Amazon, Apple, BlackBerry, Google and Windows. This figure is only one reflection of how the technologies that enable our digital selves -- like mobile computing, cloud and social media -- have not only transformed the way we work, but also how we live. In light of the fact that we also now live in an increasingly cyberthreat-filled landscape, having a comprehensive DR/BC plan is no longer optional for enterprises, says SearchCIO columnist and former CIO Harvey Koeppel.

    In this SearchCIO handbook, Koeppel offers a list of DR principles CIOs can follow to help them design and implement a solid DR/BC plan that will protect both business and personal data when the next disaster strikes. In our second piece, CTO Niel Nickolaisen shares advice on how to get the most value out of DR testing -- without risking damage to your organization. In our last article, writer Mary K. Pratt gathers tips from DR experts on how to craft a DR/BC plan that can tackle any type of disaster, including data breaches.Continue Reading

  • How to handle a data breach: Managing public perception

    When your organization plans out how to handle a data breach, managing public perception should be given special consideration. One piece of advice: Don't play the victim.Continue Reading

  • Eight-step data breach plan for the IT organization

    A data breach plan that addresses the many variations a hack can take should consider these eight points.Continue Reading

  • The steps to effective cybersecurity incident response

    Planning and foresight are essential to any cybersecurity incident response plan. Follow these steps to make sure you're ready for a data breach.Continue Reading

  • How to handle a data breach: Managing public perception

    When your organization plans out how to handle a data breach, managing public perception should be given special consideration. One piece of advice: Don't play the victim.Continue Reading

  • Data protection and security incident response when all information is a target

    Data breaches have become increasingly commonplace for businesses, and every company that has an online presence is a potential target for hackers: High-profile hacks of Target Corp. and Anthem Inc., to name a few, show how valuable personal data has become to nefarious parties. In addition to customer data, companies must make sure sensitive company information such as trade secrets and intellectual property are protected as well. To face these constantly evolving data security threats, businesses have been forced to completely revamp their approach to information protection and embed security into data governance and business processes. In this handbook, learn about the pressing information security vulnerabilities facing modern companies and advice to implement governance strategies that keep your data secure.Continue Reading

  • Mastering the cloud contract

    Cynthia Nustad recalls a time not that long ago when businesses didn't have much flexibility in negotiating contracts with cloud providers. "Maybe you could negotiate on price or add-ons, but the core service was pretty vanilla and hardened," said the CIO at HMS, a healthcare management services company. Back then, agreements that had the provider assuming part of the risk in the event of a breach were a no-go. Today, however, things have markedly changed. The rapid growth of cloud computing has given IT leaders an edge when it comes to negotiating a cloud contract.

    In this issue of CIO Decisions, get advice from CIOs and experts on how to procure more safeguards and custom features in your cloud contract that address your business needs. Also in this issue, we walk through UPS' journey from analog to digital business; outline common mistakes companies make when implementing hybrid cloud; take a look at what's under the hood of Etsy's business model; talk to former McCormick CIO Jerry Wolfe about how the spice company is using its platform business model to shake up the food industry; and examine why getting the most out of knowledge workers today requires "Supportive Leadership."Continue Reading

  • Azure AD PowerShell supports MFA to protect authentication

    The preview of the Azure AD PowerShell module flexes its muscles by supporting MFA and device management.Continue Reading

  • Creepy cloud horror stories to keep IT up at night

    With Halloween creeping in, cloud expert David Linthicum shares three cloud computing horror stories -- and advice for not finding yourself in one.Continue Reading

  • Why did Anthem resist government vulnerability assessments?

    Vulnerability assessments are often a requirement for organizations that have suffered a data breach and the assessors' results can be invaluable to protect a business.Continue Reading

  • Partners avoid liability issues with channel customer contracts

    Channel partners must ensure they make customer contracts they can abide by. The managing attorney of InfoTech Law Advocates outlines a number of common liability issues.Continue Reading

  • Small business security needs big strategies to keep Exchange safe

    To protect your small business's messaging environment, ensure that staff is properly trained and resolve all risks associated with your network.Continue Reading

  • CSA Guide to Cloud Computing

    In this excerpt of CSA Guide to Cloud Computing, authors Rai Samani, Brian Honan and Jim Reavis review cloud security threats based on research by the CSA's Top Threats Working Group.Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close