Wageningen UR, an institution of international repute in the sphere of Life Sciences deals with a huge collection of intellectual property, scientific literature, confidential data,...
Launch secure, browser-based Windows RDP, SSH and Telnet sessions from Password Manager Pro
Launching remote login sessions: Ease of use Vs Security Organizations are deploying privileged password management solutions to mitigate cyber threats and control access to sensitive...
Unauthorized access and use of protected health information is the most profitable crime in the USA: Are you fully prepared to combat? [Part-2]
In the previous post , we analyzed the magnitude of medicare fraud, protected health information stakeholders and their responsibilities. Let us now examine the causes...
Unauthorized access and use of protected health information is the most profitable crime in the USA: Are you fully prepared to combat? [Part-1]
At over $60 billion per year, Medicare fraud has become one of the most profitable crimes in America, say analysts. In South Florida, health information...
Privileged User Monitoring and Audit (PUMA)
Privileged Users, like Network Administrators, System Administrators, and Database Administrators all have unrestricted access to all the critical servers, applications, and databases in an enterprise....
Cyber-attack on Zappos: Information Security Lessons for Enterprises [Part-5]
In the previous four posts, we analyzed the causes for security incidents. We discussed how lack of internal controls, access restrictions, centralized management, accountability, strong...
Cyber-attack on Zappos: Information Security Lessons for Enterprises [Part-4]
In the previous three posts in the backdrop of the cyber-attack on Zappos.com, we analyzed the challenges associated with achieving the highest level of information...
Cyber-attack on Zappos: Information Security Lessons for Enterprises [Part-3]
In the previous two posts in the backdrop of the cyber-attack on Zappos.com, we analyzed the challenges associated with achieving the highest level of information...
Cyber-attack on Zappos: Information Security Lessons for Enterprises [Part-2]
In the previous post, in the backdrop of the cyber-attack on Zappos.com, we analyzed the main challenges associated with achieving the highest level of information...