Seek and Destroy: U.S. Energy Firms Warned of Recent IT Threats
Last Thursday, the U.S. government released a warning about the increasing risk…
The Big Data Security Transformation
For those of us in the security profession it an extremely exciting…
HIPAA in a HITECH World: HIPAA Violations on the Rise
Leon Rodriguez, Director Office for Civil Rights, U.S. Leon Rodriguez, Director Office…
Cybersecurity: Evernote Adds Two-Factor Authentication
On Saturday, the online SaaS (software as a service) note-collecting Evernote posted…
Predictive Analytics Presents: A Typical Day in 2020
What's next is what's next… Predictive analytics is where business intelligence is…
Moving to the Public Cloud? Do the Math First
A manufacturing executive claims that many companies “didn’t do the math” in…
Data Breach at Stanford Children’s Hospital
A laptop was stolen from a Stanford University-affiliated hospital on Jan. 9th.…
Three Healthcare IT Trends for 2013
This post takes a look at three key trends in healthcare information…
The APPS Act Addresses Mobile Security Concerns
AppRights AppRightsThe need for data security in an emerging mobile world has…