Webinars – Upcoming

1. Learn How to handle the biggest danger faced by Healthcare organizations, Tue Jul 12, 2016, 11am PT, Duration: 30 Mts As a compliance professional dealing with business associates agreements, when you think of the OCR HIPAA audit, what’s your first reaction? Is it one of confidence? Or is it anxiety and stress? If it’s…

Security Elements in Aegify

In this whitepaper we will discuss our effort to deploy a secure SaaS. Cloud infrastructure has indeed been a very attractive proposition to many enterprises, small or large, from the features that cloud infrastructure providers offer today. But cloud security is sometimes raised as a matter of concern. Therefore, when Aegify took its information security…

Best Practices for Threat management

‘Cyber security threats’ is now the core topic of discussion amongst enterprises and will continue to be in the coming years. This is because security concerns have assumed unimaginable dimensions in the past years, posing a major challenge to the survival of businesses. Hence enterprises are now focusing more on curbing threats and making their…

Common Attack Techniques – In an Era of Industrialized Hacking

Gone are the days when hackers attacked perimeter defences. Today their objective is to take control of confidential data and the applications which process them. Hacking is now an operation involving global coordination, sophisticated techniques and persistent teamwork. And with clear roles and responsibilities being defined in the community, hacking is now a highly organized,…

Implications of the ‘Dodd-Frank Wall Street Reform & Consumer Protection Act’, on Data Security

While the financial services regulatory reform bill signed into law by President Obama last week will take some time to be put into practice, several industry experts have noted that this extensive legislation holds immense significance for information/ data security. Creation of a new consumer protection agency at the Federal Reserve, provision of new powers…

How secure are your end-point devices?

Internet has created a world without boundaries. With this, the threat landscape has also changed and securing the information has become the need of the hour. Identifying security threats and finding counter measures to mitigate these threats is equally demanding. Outbound attacks, virus, and botnets have become very common. Apart from this, data leakage, data…

South Shore Hospital Reports Loss of Confidential Data- 800,000 Private Records at Risk

Just a week after Health Net faced penalty for a major security breach, another similar incident has been reported by the South Shore Hospital in Weymouth Massachusetts, USA. Authorities say that computer files containing personal information of nearly 800,000 people were lost when they were being shipped to a contractor for destruction. Information on the…

Your Company needs Information Security Monitoring and Integrated GRC

Did you know : Approximately 500 million records containing personal identifying information of United States residents stored in government and corporate databases was either lost or stolen in the last 5 years? Various other corporations lost US$1 Trillion worldwide as a result of data loss, accidental or malicious? Costs from the largest computer data breach…