Informatica: Establishing Order from Information Chaos
I recently attended the annual Informatica analyst summit to get the latest on that company’s strategy and plans. The data integration…
Cybersecurity: Evernote Adds Two-Factor Authentication
On Saturday, the online SaaS (software as a service) note-collecting Evernote posted a blog with subsequent email stating that they…
The IT-ization of Consumers
There continues to be a lot of discussion of the trend that's sometimes called "consumerization of IT." I think the…
The Use and Abuse of Big Data
As we begin a new year, we are promised a move from a focus on the meaning and technology of…
How the Final Omnibus Rule Affects HIPAA Cloud Computing Providers
The long-awaited final modifications to the HIPAA Privacy, Security, Enforcement and Breach Rules were introduced Thursday. The 563-word document outlines…
Evaluating Cloud Performance and Decision Making
If your business has made the leap into the cloud, then it is very likely that IT processes have become…
PCI & HIPAA Data Breaches of 2012: Lessons Learned
Here’s a review of the top 2012 data breaches within both the PCI and HIPAA compliant industries, and a quick…
The Growing World of e-Vaulting
The cloud computing industry is experiencing tremendous growth. Several independent research firms have projected that the global market for cloud…
Safeguarding Patient Data in EHRs
A recent blog by the HIPAA, HITECH & HIT legal blog of Fox Rothschild revealed a survey administered by the…
Data Transfer From Legacy to the Cloud
The transformation to the cloud is taking everything – and everyone — by storm. In spite of the earlier security…

