cio

Results 301 - 325 of 1304Sort Results By: Published Date | Title | Company Name

5 Best Practices for Mitigating Medical Device Security Risks

Published By: Great Bay Software     Published Date: Jul 16, 2018
"Healthcare organizations have significantly more to consider than the average business when it comes to network and device security. Concern over code modification, key compromise, password-based vulnerabilities and man-in-the-middle attacks have caused hospital CIOs and CISOs to rethink their security strategies and investments. The threat to these devices has even been assigned its own term: medjacking, a shortened form of “medical device hijacking.” Download this white paper for five best practices to mitigate threat and attacks that can put lives, patient trust and the growth of the healthcare organization at risk. Access the white paper today!"
Tags : 
    
Great Bay Software

The CIO Guide to Autonomic IT

Published By: Turbonomic     Published Date: Jul 05, 2018
Organizations are adopting cloud computing to accelerate service delivery. Some try to deliver cloud economies of scale in their private data centers with the mantra “automate everything,” a philosophy often simpler in theory than practice. Others have opted to leverage public cloud resources for the added benefit of the pay-as-you-go model, but are finding it difficult to keep costs in check. Regardless of approach, cloud technology poses the same challenge IT has faced for decades: how to assure application performance while minimizing costs.
Tags : 
    
Turbonomic

Scripps Health Improves Conversions with PROACTIVE Call Center

Published By: Evariant     Published Date: Jul 02, 2018
When call center agents don’t have access to an EMR, consumer demographic, sociological and other data, nor an understanding of marketing campaigns, agents are inefficient, reactive and unable to personalize interactions with patients and consumers. The disjointed call center experience harms the health system’s ability to find, guide, and keep patients for life. The call center is often the first touch for many prospective healthcare customers, and Scripps Health recognized these challenges. They made the pivot from call center as cost center to strategic lynch pin in their patient experience strategy. Call center agents are now delivering a world-class patient experience as they provide physician referrals, take class registrations, and serve as a clearing house for general information . An added bonus of the shift is they can now integrate outbound calling into campaign efforts, and measure the full impact of marketing efforts and strengthen marketing’s ROI. Get your free copy of
Tags : 
call center, conversions, health, proactive
    
Evariant

Advanced Threat Prevention Test

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Cylance commissioned AV-TEST to perform an advanced threat prevention test of enterprise endpoint protection software. The testing methodology was jointly developed to provide additive testing to the commodity antivirus protection tests currently produced by AV-TEST. CylancePROTECT® was tested against five competitor endpoint products from Kaspersky, McAfee, Sophos, Symantec, and Trend Micro. The tests were performed in December 2016 and January 2017. This report contains the results of four test cases. The primary goal was to show the detection and prevention capabilities of new and unknown malicious executables. Read more in the AV-TEST report.
Tags : 
cyber, threat, protection, av-test, cylance
    
BlackBerry Cylance

Safelite Takes on Cybersecurity

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
safe, lite, cybersecurity, data
    
BlackBerry Cylance

Hospital Takes on Cybersecurity

Published By: BlackBerry Cylance     Published Date: Jul 02, 2018
Phoenix Children’s CISO, Daniel Shuler, and its IT security team are responsible for protecting 5,000 endpoints in the hospital and across more than 20 clinics in the region. Endpoints include physician and staff laptops and desktops, nursing stations, servers, Windows-based clinical devices, credit card payment processors, and point-of-sale terminals. These endpoints are used to store and/or process personal health information (PHI), and payment and credit card information. They must comply with HIPAA for PHI and voluntarily comply with the Payment Card Industry Data Security Standard (PCI-DSS) for credit card data. The IT security team’s existing industry-leading AV solution claimed to provide visibility into malicious activity aimed at the endpoints. It continuously reported all endpoints were safe, sound, and secure. This caused Daniel to be suspicious. He knew from experience that such low levels of endpoint malicious activity was highly unlikely. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
hospital, cyber, security, data
    
BlackBerry Cylance

Trust Must Be The Foundation Of Your B2B Digital Ecosystem

Published By: IBM     Published Date: Jul 02, 2018
Far from being a soft issue, trust underpins the management of your digital business and digital ecosystems. This report highlights how trust is fundamental to your digital transformation. It focuses on the role of trust in the B2B context and analyzes the key technologies, processes, and operational values that CIOs and their teams must use to build and maintain trusted ecosystem partnerships
Tags : 
    
IBM

Source Data for Network Security Investigations

Published By: Butler Technologies     Published Date: Jul 02, 2018
Increasingly complex networks, require more than a one-size-fitsall approach to ensuring adequate performance and data integrity. In addition to the garden-variety performance issues such as slow applications, increased bandwidth requirements, and lack of visibility into cloud resources, there is also the strong likelihood of a malicious attack. While many security solutions like firewalls and intrusion detection systems (IDS) work to prevent security incidents, none are 100 percent effective. However, there are proactive measures that any IT team can implement now that can help ensure that a successful breach is found quickly, effectively remediated, and that evidential data is available in the event of civil and/or criminal proceedings.
Tags : 
    
Butler Technologies

Scale your business with self-service

Published By: Zendesk     Published Date: Jun 29, 2018
The start of a new chapter of your business, whether you're moving upmarket or adding products and features, is a great time to scale your customer service operations in a smart way. We know customers prefer self-service, via a knowledge base, if one is available. A Gartner report estimates that CIOs can reduce customer support costs by 25% or more when proper knowledge management discipline is in place. If you've been on the sidelines waiting to take the self-service leap, this white paper will prove that you and your agents already partake in the activities needed to offer great self-service, every single day.
Tags : 
    
Zendesk

Operationalize Security To Secure Your Data Perimeter

Published By: IBM     Published Date: Jun 29, 2018
Every day, companies generate mountains of data that are critical to their business. With that data comes a clear challenge: How do you protect exabytes of data that's strewn across global data centers, computer rooms, remote offices, laptops, desktops, and mobile devices, as well as hosted by many different cloud providers, without choking business agility, employee productivity, and customer experience? The solution lies not in throwing more technology at the network, but in taking specific steps to identify malicious actions and respond to them in order to fix the issue, a process known as operationalizing security.
Tags : 
    
IBM

Healthcare company moves its infrastructure to the loud

Published By: dinCloud     Published Date: Jun 19, 2018
Under the leadership of Stephen Arndt, consulting CIO, Medicalodges – a Kansas-based post-acute healthcare company – was looking to transition away from maintaining its own hardware on premises and needed a partner to help its small IT team maintain and monitor its data center infrastructure. As a healthcare services provider, Medicalodges is subject to HIPAA regulation. In order to maintain compliance, the company required a solution with inherent business continuity and redundancy.
Tags : 
healthcare, company, infrastructure, data, center
    
dinCloud

Revealing the secret life of your Code Signing certificates

Published By: DigiCert     Published Date: Jun 19, 2018
Many security-minded organizations utilize code signing to provide an additional layer of security and authenticity for their software and files. Code signing is carried out using a type of digital certificate known as a code-signing certificate. The process of code signing validates the authenticity of legitimate software by confirming that an application is from the organization who signed it. While code-signing certificates can offer more security, they can also live an unintended secret life providing cover for attack groups, such as the Suckfly APT group. In late 2015, Symantec identified suspicious activity involving a hacking tool used in a malicious way against one of our customers. Normally, this is considered a low-level alert, however, the hacktool had an unusual characteristic not typically seen with this type of file; it was signed with a valid code-signing certificate. Download this whitepaper to find out more about how you can protect your business from such threats.
Tags : 
    
DigiCert

From Website Security Architecture To The Boardroom: Optimizing Your Business

Published By: DigiCert     Published Date: Jun 19, 2018
Your website is your most important digital asset and so protecting it is as important as ensuring positive cash flow, paying staff salaries and keeping the lights on in the head office. Despite the threats and the importance of website security, IT department organization, goals and technology – their ‘website security architecture’ – is often unfit for the purpose. With correct planning and strong execution, CIOs and CISOs can create a problem-solving, self-aware, agile organization that is better protected against fast-changing threats. This white paper explores the challenges they face and suggests a roadmap for change.
Tags : 
    
DigiCert

ROI en estaciones de trabajo móviles demasiado convincentes para ignorar

Published By: HP Inc.     Published Date: Jun 15, 2018
Durante mucho tiempo, las estaciones de trabajo se veían principalmente como plataformas adecuadas solo para científicos e ingenieros que necesitaban ejecutar aplicaciones, como por ejemplo de CAD/CAM. Pero en los últimos años ha surgido una amplia gama de aplicaciones que involucran, por ejemplo, distintas formas de medios digitales. La mayoría de esas aplicaciones se han implementado en PC tradicionales, principalmente porque eran de fácil acceso. Pero a medida que las diferencias de precios entre las PC y las estaciones de trabajo se han ido reduciendo, se ha hecho evidente que muchas de estas aplicaciones de medios digitales tienen mucho en común con las aplicaciones de ciencia e ingeniería. En pocas palabras, las aplicaciones de medios digitales funcionan mucho mejor y más rápido en estaciones de trabajo basadas en la última generación de x86 y unidades de procesamiento gráfico (GPU) que funcionan con Windows que en cualquier otro equipo.
Tags : 
    
HP Inc.

ROI en estaciones de trabajo móviles demasiado convincentes para ignorar

Published By: HP Inc.     Published Date: Jun 15, 2018
Durante mucho tiempo, las estacionesde trabajo se veían principalmente como plataformas adecuadas solo para científicos e ingenieros que necesitaban ejecutar aplicaciones, como por ejemplo de CAD/ CAM. Pero en los últimos años ha surgido una amplia gama de aplicaciones que involucran, por ejemplo, distintas formas de medios digitales. La mayoría de esas aplicaciones se han implementado en PC tradicionales, principalmente porque eran de fácil acceso. Pero a medida que las diferencias de precios entre las PC y las estaciones de trabajo se han ido reduciendo, se ha hecho evidente que muchas de estas aplicaciones de medios digitales tienen mucho en común con las aplicaciones de ciencia e ingeniería. En pocas palabras, las aplicaciones de medios digitales funcionan mucho mejor y más rápido en estaciones de trabajo basadas en la última generación de x86 y unidades de procesamiento gráfico (GPU) que funcionan con Windows que en cualquier otro equipo.
Tags : 
    
HP Inc.

Is DNS Your Security Achilles Heel?

Published By: Akamai Technologies     Published Date: Jun 14, 2018
With the constant drumbeat of news reports about security breaches, cyber security is hard to ignore. Organizations understand that they need comprehensive security solutions, yet significant gaps remain. Malicious actors have evolved their methods to leverage the vulnerabilities of the Domain Name System (DNS), and attacks that utilize this vector are increasing in number.
Tags : 
dns< security breach, cyber security
    
Akamai Technologies

Adopt DNS Best Practices to Proactively Protect Against Malware

Published By: Akamai Technologies     Published Date: Jun 14, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
dns, cybersecurity, malware, phishing, ransomware, data exfiltration
    
Akamai Technologies

A Guide to Strategic Cost Cutting, Restructuring, and Renewal

Published By: PwC     Published Date: Jun 14, 2018
The positive impact of most cost-cutting efforts is short-lived, as individuals revert to past behaviors and spending habits. As normalcy returns, so can costs and head count. How do you keep the spirit alive? How do you make cost consciousness an organizational capability and a shared mind-set, rather than a bunch of rules that are resented and resisted? Look to the following strategic, operational, organizational, and cultural levers to help you sustain the change.
Tags : 
    
PwC

Upgrade to Dell OptiPlex and Intel® Optane™ and Save Time on Everyday Tasks

Published By: Dell     Published Date: Jun 13, 2018
We expend so much energy trying to make each minute count in many areas of our life – why wouldn’t we take the same approach to our computing experience? Time stuck waiting on a system could be better spent solving problems, working, or even playing. Download this research study to learn more about how you could be saving time that is lost on slow end user computing systems. Find out how Intel® Optane™ memory with Dell OptiPlex 7050 Micro provides a simple way to improve system responsiveness in several key areas to give users a way to reclaim precious time and become more efficient.
Tags : 
    
Dell

Cinco Casos de Uso CASB que Necesita Conocer

Published By: Symantec     Published Date: Jun 13, 2018
El actual escenario es una desenfrenada carrera. Los funcionarios y las organizaciones adoptan a ritmo acelerado aplicaciones y servicios en la nube debido a la productividad, colaboración y conveniencia que ofrecen. ¿Y por qué actuarían de forma diferente? Si tiene un problema, es posible que exista una aplicación en la nube que pueda solucionarlo. Así mismo, el movimiento a nivel corporativo que se distancia de licencias tradicionales de software hacia plataformas en la nube como Office 365, G Suite, Salesforce, etc., ofrece el beneficio adicional de un modelo financiero de Opex en lugar de Capex para sus costos de software.
Tags : 
    
Symantec

Cinco Casos de Uso CASB que Você Deveria Conhecer

Published By: Symantec     Published Date: Jun 13, 2018
O cenário atual é uma corrida desenfreada. Funcionários e organizações adotam aplicativos e serviços na nuvem em um ritmo acelerado devido à produtividade, colaboração e conveniência que oferecem. E por que agiriam de forma diferente? Se você tem um problema, provavelmente há um aplicativo na nuvem que pode resolvê-lo. Além disso, o movimento a nível corporativo que se distancia de licenças de software tradicionais para plataformas na nuvem como o Office 365, G Suite, Salesforce, etc., oferece o benefício adicional de um modelo financeiro de Opex ao invés de Capex para seus custos de software.
Tags : 
    
Symantec

Securing Your AWS Global Transit Network: Are You Asking the Right Questions?

Published By: Aviatrix     Published Date: Jun 11, 2018
In evaluating the security posture for your Global Transit Network, your first question might be: Why do I even need additional security? Isn’t what Amazon provides “out of the box” adequate? This is not the right question to ask first. It’s important to appreciate that, while Amazon says it has a shared security model, your Amazon EC2 instance may not meet your security requirements “by default.” Though Amazon makes specific security features available to you, it’s still up to you to choose judiciously among the many native and third-party options. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix, walk through five use cases and examine what Amazon provides, and the questions you need to be asking to implement Amazon services – or add additional ones – that are appropriate for your business. After examining each use case, we’ll show you how we handle it for our own business. Who Should Watch? Anyone responsi
Tags : 
aws, aws vpc, aws transit vpc, secure transit vpc, vpc egress filter
    
Aviatrix

CIOs and the Future of IT

Published By: Forrester Research     Published Date: Jun 11, 2018
There’s an alarming digital divide within many companies. Marketers are developing nimble software to give customers an engaging, personalized experience, while IT departments remain focused on the legacy infrastructure. The front and back ends aren’t working together, resulting in appealing websites and apps that don’t quite deliver. We’ve arrived at this misalignment for understandable reasons. Previously, most chief information officers (CIOs) were hired to digitize and bring order to companies’ internal systems and processes. They saw websites as marketing channels and were happy to let chief marketing officers (CMOs) oversee that province of technology. They had, and still have, plenty to do just to keep internal operations running smoothly. Marketers soon got into the habit of developing not just content, but also software programs to better reach and transact with customers. But now that websites and apps are becoming cornerstones of the business, the stakes are too high to al
Tags : 
cio, marketers, business, digital, customers
    
Forrester Research

Stop Rowing Alone: Integrated Cybersecurity Ecosystems Will Get You Further

Published By: IBM     Published Date: Jun 06, 2018
System vulnerabilities, ransomware, malware, intrusions, and other malicious activities are on the rise, showing that today’s cybersecurity professionals are hard-pressed to keep enterprises secure. Although threats are growing in sophistication and attack vectors are expanding, many of the intrusions and cyber attacks happening today are simply a result of improper protections being put in place, systems going unpatched, or weak security policies. While much of the blame is being placed on cybersecurity professionals, the real blame should often be placed upon the tools and policies that many of those professionals have come to trust and the complexity that comes with them.
Tags : 
    
IBM

Stop Rowing Alone: Integrated Cybersecurity Ecosystems Will Get You Further

Published By: IBM     Published Date: Jun 05, 2018
System vulnerabilities, ransomware, malware, intrusions, and other malicious activities are on the rise, showing that today’s cybersecurity professionals are hard-pressed to keep enterprises secure. Although threats are growing in sophistication and attack vectors are expanding, many of the intrusions and cyber attacks happening today are simply a result of improper protections being put in place, systems going unpatched, or weak security policies. While much of the blame is being placed on cybersecurity professionals, the real blame should often be placed upon the tools and policies that many of those professionals have come to trust and the complexity that comes with them.
Tags : 
    
IBM
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.