Change Catalyst: Armor Hero Cheryl Gant For Armor Hero Cheryl Gant, diversity and representation has always been important. And though she has followed an unconventional path into her technology career, this Armor Hero has made herself at home and taken up the call to help move Armor’s diversity and inclusion efforts onward and upward. As […]
By Jason Newman, Chief Information Security Officer at Blue Cross and Blue Shield of Minnesota I’m a VP and chief information security officer for Blue Cross and Blue Shield of Minnesota (Blue Cross). In my role, I am responsible for information security, IT risk management, business resilience, and crisis management within Blue Cross. HITRUST: How […]
By Jeremy Huval, Vice President, Compliance & Internal Audit, HITRUST® Completing HITRUST CSF® Assessments will now require less time and fewer resources—thanks to the “Using Work of Others” initiative just announced as part of the ongoing improvements being made to the HITRUST Assurance Program. This is just the latest example of how HITRUST continually enhances […]
By Sean Martin, HITRUST® Independent Security Journalist Earlier this year, the New York eHealth Collaborative (NYeC), in conjunction with the New York State Department of Health, announced and released its SHIN-NY 2020 roadmap, Improving Health in Our Communities which defines the next phase of the Statewide Health Information Exchange for New York (SHIN-NY). There is […]
By Becky Swain, Director, Standards Development, HITRUST® Your cloud provider is certified to comply with all the major regulations for protecting data in the cloud. That must mean your organization is also certified, right? Not so fast! While it may be possible to leverage what your cloud service provider is doing, you need to know […]
We recently discussed the need for UK organisations to consider their security posture in light of rapid technology adoption and the growth of online sales. Retailers must not only protect a customer’s financial data under PCI DSS regulations, they must also adhere to data processing guidelines brought about by GDPR. As volume and complexity increase, finding […]
We recently explored how the rapid adoption of e-commerce in the UK makes it a world leader in online shopping and a target for cyberthreats. Retailers are a major target for cybercriminals not only because they often store large volumes of personal and financial data, but also because the speed of adoption requires UK e-commerce […]
When it comes to e-commerce, the scrappiest fighter for online sales has long been the United Kingdom. While geographically smaller than the US, the UK has the most advanced e-commerce market in Europe and are second in the world in online spending per capita. So why does the UK seem to punch above its weight […]
Today, Microsoft Azure boasts an incredible growth rate of 39 percent in the first half of 2020, making it the world’s second-largest public cloud provider after AWS. Many organizations host environments on several public cloud platforms as well as on-premise and private cloud servers. As organizations continue to adopt multi-cloud strategies that include Azure, Armor […]
For security professionals, one of the first steps in defending an organization is having visibility across environments and being able to analyze and prioritize event data, alerts, and incident response. Collecting log and data artifacts allows defenders to fully understand which events authentic, and which ones are problematic. Defenders must first be able to cut […]