Can You Mitigate Risk with Compliance and Integrity Monitoring for HIPAA and Healthcare?

The Health Insurance Portability & Accountability Act (HIPAA) was instituted in 1996, just as medical information was making the transition to the digital storage medium. Originally intended merely to administrate better coverage for digital t… Continue reading Can You Mitigate Risk with Compliance and Integrity Monitoring for HIPAA and Healthcare?

Turning Malware Trends into Proactive Behaviors

Most of the industry agrees: malware is on the rise. My news feed rarely manages a week without an incident making the headlines. Here are some of the most recent events I’ve seen: Online retailer Newegg suffered a data breach at the hands of the… Continue reading Turning Malware Trends into Proactive Behaviors

7 Regulations Requiring File Integrity Monitoring for Compliance

Maintaining compliance can be a challenge with  limited budgets and resources.  Challenges by compliance and IT professionals include resource shortages, personal liability and regulatory change. 
The post 7 Regulations Requiring Fi… Continue reading 7 Regulations Requiring File Integrity Monitoring for Compliance

HR Software Provider Says Malware Infection Might Have Exposed User Data

A provider of HR software said that a malware infection might have exposed user data including personal and account information. According to a statement posted on its website, PageUp observed unusual activity on its IT infrastructure and subsequently … Continue reading HR Software Provider Says Malware Infection Might Have Exposed User Data

Is there a tool that will perform FIM and look for credit card information? [on hold]

I have been wanting to ask this question and I am running into dead end after dead end.

I have an environment that must meet new requirements of monitoring file changes and search for credit card numbers. The FIM (File integ… Continue reading Is there a tool that will perform FIM and look for credit card information? [on hold]

The Five Stages of File Integrity Monitoring (FIM)

The benefits of a capable and properly deployed File Integrity Monitoring (FIM) solution are plentiful: If you see unexpected or unexplained file changes, you can investigate immediately and resolve the issue quickly if your system has been compromised… Continue reading The Five Stages of File Integrity Monitoring (FIM)

What Is Vulnerability Management?

Enterprise networks regularly see change in their devices, software installations, and file content. These modifications can create risk for the organization. Fortunately, companies can mitigate such risk by implementing foundational security controls…. Continue reading What Is Vulnerability Management?

What Is Vulnerability Management?

Enterprise networks regularly see change in their devices, software installations, and file content. These modifications can create risk for the organization. Fortunately, companies can mitigate such risk by implementing foundational security controls…. Continue reading What Is Vulnerability Management?