compliance

Tag: compliance

How Automation Takes the Time and Guesswork Out of Security Compliance

As this fiscal year wraps up, many agencies are planning their response to compliance reporting requirements. Meeting these requirements—particularly in advance of an audit—can be incredibly time-consuming. While the Defense…

Beyond the EHR: 3 Other Places Healthcare Organizations Need to Watch to Ensure HIPAA Compliance

With the state of the world today, healthcare facilities of all kinds and sizes are operating under a state of distress. Employees are working on the frontlines, while also having…

4 Reasons Why IT Risk Detection is Critical in the Service Desk

In the previous blog, I discussed how IT risks can infiltrate the service desk if proper incident, problem, and change management aren’t applied. But, IT risk detection in the service…

Why the Rise of Automation Is a Programmer’s Paradise

Automation is increasingly one of the cornerstones of an optimized federal IT environment. If you’re a federal IT pro, you may be asking, “Will automation make my job easier?” The…

Details on DISA’s Infrastructure “Hardening” Rules

The Defense Information Systems Agency (DISA) has a set of security regulations to provide a baseline standard for Department of Defense (DoD) networks, systems, and applications. DISA enforces hundreds of…

Two Critical Security Tips to Kick Off National Cybersecurity Awareness Month

Brandon Shopp expands on his two tips for National Cybersecurity Awareness Month to help you provide the best security support you can to your users. On October 31, we’ll celebrate…

Maintaining a Secure Environment: Compliance Considerations

A security policy based on actual use cases has been documented, as have the components of the ecosystem. Before devising a practical implementation and configuration plan, one more assessment should…

Automated Compliance — SolarWinds TechPod 016

Destiny Bertucci and Eric Hodeen discuss SolarWinds Network Configuration Manager and the benefits of automated compliance. Related Links SolarWinds Network Configuration Manager Getting Started with Network Configuration Manager – Video…

The Story Patching Tells

In post #3 of this information security series, let’s cover one of the essential components in an organization’s defense strategy: their approach to patching systems. Everywhere an Attack When did…

Does Data Have Ethics? Data Ethic Issues and Machine Learning

Welcome to part one in a five-part series on machine learning and artificial intelligence. I figured what better place to start than in the highly contested world of ethics? You…