HIPAA Data Security & Privacy

November 8, 2018

Under the HIPAA mandate, covered entities and business associates are subject to the Security Rule that covers confidentiality, integrity, and availability of electronic Protected Health Information (ePHI) and the Privacy Rule that limits the uses and disclosures of PHI. These rules have long been in place, but how ePHI moves through and across IT infrastructure and is tied to Personal Information within IT systems and applications has shifted since the rules were first written.

Spotlight

Solared Cyber Security

Solared Cyber Security is the software vendor in the field of information security and managed security service provider offering cutting-edge solutions to help companies fight against internal (like corporate fraud and collusion) and external threats. We develop cutting-edge technologies based on vast expertise in real security threats and extensive experience. working with enterprise-grade information security and corporate security teams. We strive to make the new technologies more accessible to information security specialists and managers. Our deployment options vary from on-premise or SaaS to various models of managed services ensuring customers obtain hassle-free and fast results.

OTHER WHITEPAPERS
news image

identity and zero trust - H-ISAC

whitePaper | August 25, 2022

These days, you can’t have a conversation about cybersecurity without talking about zero trust. The security concept requires that all individuals and devices on a network be continuously authenticated, authorized, and monitored. Gone are the days of letting someone in the front door, giving them a role with access privileges and then having them go about their merry way.

Read More
news image

HMC 1030 Connectivity Security White Paper

whitePaper | March 14, 2023

This document describes data that is exchanged between the Hardware Management Console (HMC) and the IBM Service Delivery Center (SDC). In addition, it also covers the methods and protocols for this exchange. This includes the configuration of “Call Home” (Electronic Service Agent) on the HMC for automatic hardware error reporting. All the functionality that is described herein refers to Power Systems HMC and the HMC that is used for the IBM Storage System DS8000.

Read More
news image

Symantec White Paper - The Cyber Resilience Blueprint: A New Perspective on Security

whitePaper | January 2, 2020

In this sophisticated threat environment, traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists, but through evaluations based on the current threat environment and the acceptable risk level for the organization.

Read More
news image

Mid-Year Threat Landscape Report

whitePaper | November 17, 2019

The first half of 2019 brought interesting developments in malware targeting popular operating systems, in hardware and software vulnerabilities affecting consumer and businesses, and in the increased number of attacks aimed at (and even carried out by) IoTs. With the money motive driving the proliferation of malware, cybercriminals are nothing if not resourceful when developing new malware strands or coming up with more successful attack vectors. The number of malware samples roaming the internet is about to reach the 1 billion1 milestone.

Read More
news image

The Cyber Resilience Blueprint: A New Perspective on Security

whitePaper | December 15, 2019

In this sophisticated threat environment, traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists, but through evaluations based on the current threat environment and the acceptable risk level for the organization.

Read More
news image

Big Data and Ai for The Financial Sector: Challenges and Opportunities

whitePaper | September 1, 2022

Artificial Intelligence (AI) is not a recently discovered field. Since the beginning of the computer science discipline, in the late 1950s, AI has drawn a lot of attention in the international scientific community and since then it has represented a field of study which has triggered diverse and numerous research activities.

Read More

Spotlight

Solared Cyber Security

Solared Cyber Security is the software vendor in the field of information security and managed security service provider offering cutting-edge solutions to help companies fight against internal (like corporate fraud and collusion) and external threats. We develop cutting-edge technologies based on vast expertise in real security threats and extensive experience. working with enterprise-grade information security and corporate security teams. We strive to make the new technologies more accessible to information security specialists and managers. Our deployment options vary from on-premise or SaaS to various models of managed services ensuring customers obtain hassle-free and fast results.

Events