compliance

Tag: compliance

Beyond the EHR: 3 Other Places Healthcare Organizations Need to Watch to Ensure HIPAA Compliance

With the state of the world today, healthcare facilities of all kinds and sizes are operating under a state of distress. Employees are working on the frontlines, while also having…

4 Reasons Why IT Risk Detection is Critical in the Service Desk

In the previous blog, I discussed how IT risks can infiltrate the service desk if proper incident, problem, and change management aren’t applied. But, IT risk detection in the service…

Why the Rise of Automation Is a Programmer’s Paradise

Automation is increasingly one of the cornerstones of an optimized federal IT environment. If you’re a federal IT pro, you may be asking, “Will automation make my job easier?” The…

Details on DISA’s Infrastructure “Hardening” Rules

The Defense Information Systems Agency (DISA) has a set of security regulations to provide a baseline standard for Department of Defense (DoD) networks, systems, and applications. DISA enforces hundreds of…

CSAM: Surprising Truths about Compliance and Security

In our final post for Cybersecurity Awareness Month, Tim Brown looks at the growing trend of industry-agnostic compliance laws and the relationship between compliance and security. Compliance laws often drive…

Two Critical Security Tips to Kick Off National Cybersecurity Awareness Month

Brandon Shopp expands on his two tips for National Cybersecurity Awareness Month to help you provide the best security support you can to your users. On October 31, we’ll celebrate…

Maintaining a Secure Environment: Compliance Considerations

A security policy based on actual use cases has been documented, as have the components of the ecosystem. Before devising a practical implementation and configuration plan, one more assessment should…

Automated Compliance — SolarWinds TechPod 016

Destiny Bertucci and Eric Hodeen discuss SolarWinds Network Configuration Manager and the benefits of automated compliance. Related Links SolarWinds Network Configuration Manager Getting Started with Network Configuration Manager – Video…

The Story Patching Tells

In post #3 of this information security series, let’s cover one of the essential components in an organization’s defense strategy: their approach to patching systems. Everywhere an Attack When did…

Does Data Have Ethics? Data Ethic Issues and Machine Learning

Welcome to part one in a five-part series on machine learning and artificial intelligence. I figured what better place to start than in the highly contested world of ethics? You…