CEO discusses problems with push for health IT adoptionDate: Jul 02, 2010
Ray Campbell, CEO of the Massachusetts Health Data Consortium, warns that health IT adoption alone is not enough to improve quality of care.
Learn how InterSystems’ technology provides healthcare organizations with faster patient data storage performance and security, easier data aggregation and normalization, and active analytics.Click Here
( Jan 26, 2015 )
( Nov 18, 2014 )
The SEC's Regulation SCI targets the securities' market IT systems, but could serve as a model for other sectors struggling with high-tech compliance.
In this tip, learn why best practices such as continuous monitoring and third-party vetting are vital to long-term mobile compliance and security.
New compliance requirements under PCI DSS version 3.0 strive to make cardholder data security part of companies' everyday business processes.
Mobile World Congress 2015 didn't disappoint, with breakthroughs in mobile payment, Internet connectivity, virtual reality and more. Also in Searchlight: Apple Pay fraud on the rise; former Secretary of State Hillary Clinton used private email for government affairs.
Enterprise mobile computing marches on, and data is proliferating. Companies need to put them together to compete effectively.
As the number of IoT devices in the enterprise grows, so do the potential risks. In this #CIOChat, participants identify the biggest IoT security challenges facing IT and the enterprise.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
Linux containers are nothing new. But with the rise of Docker, Red Hat Atomic Host is being rolled out as an OS focusing on security and the surrounding infrastructure.
Open source cloud allows enterprises to dodge software payments and vendor lock-in. But some organizations are better off walking away.
A cloud services broker role can be filled by a third party, a cloud provider or even in-house IT. So which is the best option for my business?
Bring your own device (BYOD) can be a boon for both employees and enterprises, but clear policies and management tools are needed.
IT departments deploying mobile health care solutions must ensure that using mobile devices in health care settings doesn't violate federal laws or compromise security.
Distributed antenna systems and in-building wireless solutions are two options to improve wireless cellular coverage within an enterprise facility.
News roundup: Bug bounty programs can offer big rewards to researchers, unless Adobe is handing out the prizes. Plus: Signal 2.0 encryption app; app cloning risk increasing; Angler adopts 'domain shadowing' capability.
Tokenization is a key technology underlying Apple Pay, promising to boost payment data security. Mike Chapple examines how Apple Pay's tokenization system works, and whether it will provide any PCI DSS compliance relief.
There's a lot of confusion surrounding the HIPAA compliance requirements for mobile health apps. Expert Mike Chapple finally clears it up for health app vendors.
Confusion reigns in the storage world, as new data storage technology tries to find its place in the data center.
SUSE sets its sights on open source storage, making SUSE Enterprise Storage with Ceph generally available, with an enhanced version to follow in the summer.
Use this guide to determine if a SAN is right for your environment, or if you should go with DAS or NAS.