Search
Close this search box.

Blog

HHS announces Phase 1 winners of the Move Health Data Forward Challenge

Proposals designed to help consumers share their personal health data easily and securely The Department of Health and Humans Services’ Office of the National Coordinator for Health Information Technology (ONC) today announced the Phase 1 winners of the Move Health Data Forward Challenge. Winners were selected based on their proposals for using

Read More >

Compliance: Why It Matters and How to Achieve It

Compliance: Why It Matters and How to Achieve It Why Compliance? According to a recent report on data security compliance, industries ranging from retail to healthcare to banking claim that protecting data to comply with corporate policies, industry regulations, or data privacy laws is very important, especially in sectors which are highly

Read More >

Structure Security Conference 2016 – Three Themes

This week, we attended the Structure Security conference in San Francisco’s Presidio Golden Gate Club. It was billed as a conference that “will highlight the best practices that security professionals are using to protect some of the world’s largest companies and institutions, and examine the future of security products, services,

Read More >

Attorneys: Is Your Information Governance Rock Solid?

Attorneys: Is Your Information Governance Rock Solid? Great architecture begins with a rock-solid foundation. Builders envision elaborate structures, but when the foundation is not firm, trouble is sure to follow. At best, a building leans; at worst, it completely topples over. In the Information Age, businesses, especially law firms, don’t

Read More >

(IN)Secure Magazine: Hyper-Evasive Threats are Killing Sandboxing

A new generation of hyper-evasive malware is defeating legacy sandboxing technology and driving new security countermeasures underpinned by the elastic processing capacity of the cloud, as Cyren’s VP of Threat Research explains in an article in the September issue of (IN)SECURE Magazine.  In the article, Sigurdur Stefnisson reviews the evolution

Read More >

Windows Media Player DRM Used for Malware (Again..)

Movie and TV watchers who download pirated content have long been warned of the potential for malware that might accompany their chosen media. Now use is again being made of Digital Rights Management (DRM) functionality — designed to prevent piracy — to distribute malware. The new attack, brought to Cyren’s

Read More >

Duplicates: Files vs Records & Why You Need to Know the Difference

Duplicates: Files vs Records & Why You Need to Know the Difference Within each database, and eventually, each enterprise content management (ECM) system, businesses must manage the limits of storage. Relational databases are filled with countless records and files; unfortunately, many of those are duplicated, which take up much-needed storage

Read More >