June 9, 2017
The business case for enterprise file sync-and-sharing tools
"Enterprise file sync-and-sharing tools can serve an important service for mobile environments that need to share and" collaborate on files...
Read More
June 7, 2017
Improving Patient Privacy, Workflow with HIPAA Compliant Forms
Cloud-based services are quickly becoming more common in healthcare, especially as organizations are trying to find HIPAA compliant ways of...
Read More
June 6, 2017
Analysis: Are HHS Cybersecurity Recommendations Achievable?
A new Department of Health and Human Services report to Congress containing more than 100 recommendations for how healthcare can...
Read More
June 5, 2017
Network Visibility Architectures: One Size Does Not Fit All
The term "network visibility" has been in the networking space for ages, but has never been as important or relevant...
Read More
June 2, 2017
ECM, at your service!
There was a time when just getting control of enterprise content was a big achievement—knowing where the content was, being...
Read More
May 31, 2017
Molina Healthcare investigates breach of patients’ data
Long Beach-based Molina Healthcare, a major insurer in Medicaid and state exchanges across the country, has shut down its online...
Read More
May 30, 2017
IT startup companies seek product advice from CIOs
A number of the companies participating in the MIT CIO conference's Innovation Showcase can point to CIOs as important sources...
Read More
May 24, 2017
Hospitals and GPs to be rated on data security after cyber attack
The healthcare inspectorate will beef up its scrutiny of the state of IT systems in hospitals and surgeries as the...
Read More
May 22, 2017
The encryption challenge: It is critical to take the attitude that data must be protected at source.
There are many encryption challenges in the tech world today, particularly as the importance of encryption as a fundamental, rather...
Read More
May 19, 2017
`Man-in-the-middle’ fraud: How to prevent it, who is at risk, and what to do when it all goes wrong
What is `man-in-the-middle' fraud? A form of fraud, colloquially known as a `man-in-the middle' attack, has become increasingly common in...
Read More