privacy and security

Results 76 - 80 of 80Sort Results By: Published Date | Title | Company Name
Published By: Data Guard Systems, Inc     Published Date: May 06, 2009
The data security challenges in the healthcare industry have never been as challenging as they are today. Not only must healthcare providers comply with HIPAA regulations concerning patient privacy and electronic data security, they must also guard against identity theft as well more complex scenarios of insurance data theft, medical identity theft and the adulteration of health records.
Tags : 
online identity theft, encryption software, advanced password protection, alertboot, identity, theft, dataguard, credit card, payment, fraud, anti-virus, anti-spam, pre-boot authentication, advanced password protection, file-based password protection, encryption, full disk, file encryption, breach, breaches
    
Data Guard Systems, Inc
Published By: Cloud Sherpas     Published Date: Nov 06, 2015
Watch this webinar replay to explore the principles that guide Google’s security and privacy policies in order to understand how going Google can transform your organisation without compromising security.
Tags : 
security, cloud, cloud computing, security cloud computing, security and privacy, google, google apps
    
Cloud Sherpas
Published By: IBM     Published Date: Apr 20, 2017
We are pleased to present the findings of The State of Mobile Application Insecurity sponsored by IBM. The purpose of this research is to understand how companies are reducing the risk of unsecured mobile apps in the workplace. Ponemon Institute is dedicated to independent research and education that advances responsible information and privacy management practices within business and government. Our mission is to conduct high quality, empirical studies on critical issues affecting the management and security of sensitive information about people and organizations.
Tags : 
(delete)mobile application, malware protection, mobile security, application security, proprietary software, open source software, cloud services, source code testing
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Improper user access to applications can expose an organization to cyber attacks, with wide-ranging financial, social, public relations and legal implications for a compromised enterprise. To address these risks—and to meet regulatory requirements for authentication, data privacy and security—organizations sometimes find themselves wrestling with complex and costly access-management approaches.
Tags : 
critical data, access security, user experience, it strategy, identity federation
    
IBM
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
The European General Data Protection Regulation (GDPR) will be upon us on May 25th 2018, and contrary to enduring public opinion, Brexit won’t make any difference. The GDPR comes in response to global shuffling of privacy laws to meet the growing demands of cloud, data security and other technological needs. The US Safe Harbor framework has been replaced with Privacy Shield, and on top of this is the e-Privacy Regulation, which takes specific interest in electronic communications, cookies for tracking user behaviour online, and other issues around personal data and consent.
Tags : 
gdpr, storage, access management, personal data, software development, ca technologies, anonymize data, privacy projects
    
CA Technologies EMEA
Start   Previous    1 2 3 4     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.