Servers, Desktop/laptop, Medical devices, Storage, Networking, Security, Mobile, Cloud architecture
Inventory, Billing, Decision support, Process management, PHR services, Data analytics, BI systems, Cloud applications
Organization, Interoperability, Regional extension centers, Information exchange
Privacy, Security, Safety
HIMSS, AHIMA, RSNA, CHIME, ATA
EHR best practices, EHR selection, EHR implementation, EHR certification
ICD-10, Meaningful use, Health care policy, Quality reporting
Learn how InterSystems’ technology provides healthcare organizations with faster patient data
storage performance and security, easier data aggregation and normalization, and active
More data, more problems? #GRCchat participants discuss new governance challenges and how to revamp an information lifecycle management strategy.
Former eBay CISO David Cullinane discusses why new threats make security-related information sharing an integral part of corporate data protection.
Attorney Jeffrey Ritter discusses mobile management processes to help companies protect both their data assets and employees' personal information.
As corporations go high-tech, the bad guys go low-tech around cyberdefenses. Here's what CIOs miss and how to go on the cyberoffense.
In these days of a breach a minute, a strong information security program is a competitive differentiator. Here's how CIOs and CISOs prove it.
A new way to tap internal talent, where crowdsource tools fall short and a look at the bank of information: The Data Mill reports.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
A 'naked cloud' takes a minimalist approach to cloud computing, but is it right for enterprises?
Incremental updates in the latest OpenStack release aim to improve the quality of OpenStack services and smooth the installation process for IT pros.
When it comes to choosing an IaaS provider, don't be enticed by price drops. Your choice should be focused on partnering ability, not the lowest cost.
Bring your own device (BYOD) can be a boon for both employees and enterprises, but clear policies and management tools are needed.
IT departments deploying mobile health care solutions must ensure that using mobile devices in health care settings doesn't violate federal laws or compromise security.
Distributed antenna systems and in-building wireless solutions are two options to improve wireless cellular coverage within an enterprise facility.
The 2014 Verizon data breach report shows a big rise in Web application attacks, with CMS frameworks and user credentials the most likely targets.
When it comes to security, network segmentation can be a blessing or a curse. In this tip, we look at the pros and cons of this enterprise decision.
The Verizon DBIR 2014 shows that organizations should build a security strategy around industry-specific threats and incident patterns.
Riverbed rebrands its Granite appliances as SteelFusion, and recasts them as a branch converged infrastructure instead of pure storage devices.
Load DynamiX test suite supports VDI and data reduction; adds a multiprotocol device and virtual appliance.
Industry expert George Crump, President and Founder of Storage Switzerland, discusses the topics of his upcoming Data Protection workshop.