February 24, 2015

Behavioral Analysis Could Have Prevented The Anthem Breach

February 24, 2015, Forbes Healthcare   There’s a universal truth regarding every cyber attack: attack behavior never appears normal. This seemingly simple fact holds true whether the attack was executed by a first-timer or perpetrated by a nation-state and is crucial to preventing future information security breaches like Anthem’s. The future of IT security is technology that consistently and accurately identifies behaviors that aren’t normal. By employing a behavioral analysis approach, organizations will no longer be behind the power curve of the endless streams of new and morphed exploits to which they find themselves vulnerable everyday. The question then becomes […]
February 24, 2015

How Better Log Monitoring Can Prevent Data Breaches

Recent high-profile data breaches reaffirm that the threat from data thieves is both persistent and pervasive. Could better log monitoring mitigate or even prevent these types of security catastrophes? February 24, 2015, CIO Magazine – Evidence suggests that high-profile data losses at major retailers such as Home Depot, Sony, Target and Michaels Stores are a major ongoing trend, not a one-and-done anomaly of the IT infrastructure on which most companies rely. The wholesale loss of millions of customers’ personally identifiable information (PII) to hackers and other ne’er-do-wells creates a crisis of public confidence that can directly impact corporate financial results […]
February 22, 2015

Why Breach Detection Is Your New Must-Have, Cyber Security Tool

Editor’s note: Paz Eshel is a vice president, and Bucky Moore and Shiran Shalev are associates, at Battery Ventures. Eshel and Shalev are based in Battery’s Israel office, while Moore works from Menlo Park. Cyber attacks are all over the news, and it seems like no one is immune — Home Depot, Target, Adobe and eBay included.  So why are CIOs still fighting cyber criminals with one hand tied behind their backs? Shockingly, most companies are still relying on outdated, only partially effective methods to protect their sensitive data, mainly with technology that focuses on preventing incoming attacks. But actually stopping […]
February 21, 2015

2015 PHI Protection Network Forum – A Time “Before Target and After Target”

February 20, 2015 Rick Kam, President of ID Experts and Chairman of the PHI Protection Network Los Angeles: It is 10:33 am the day after attending the third annual PPN Forum in Orange, California on February 19, 2015. I am sitting in seat 26D at the back of Alaska fight 587 traveling home and reflecting on the highlights of the forum. The key message at the forum was that mega data breaches starting with Target in December of 2013 through the recent breach of up of to 80 million members of Anthem has created a “window of opportunity” for PHI […]
February 21, 2015

SPHER™ significantly reduces the time required to meet HIPAA and meaningful use privacy and security requirements

AMS SPHER™ Delivers Breach Detection for HITEC-LA Participants SPHER™ significantly reduces the time required to meet HIPAA and meaningful use privacy and security requirements LOS ANGELES – All Medical Solutions (AMS) announced today the launch of its SPHER™ breach detection service for electronic health records (EHRs) that helps solo, small group, and clinic health care providers meet Health Insurance Portability and Accountability Act (HIPAA) and meaningful use Stage 1 privacy and security requirements. The HIPAA security rule in the Code of Federal Regulations §164.308(a)(1)(ii)(D) requires that providers “implement procedures to regularly review records of information system activity, such as audit […]