Category: Blog

Resilient and Team win Phase 1 of the Move Health Data Forward Challenge

Resilient along with its partners WebShield Inc., SAFE-BioPharma (@SAFE_BioPharma), Carebox (@CareboxHealth) and InterSystems (@InterSystems) are delighted to announce that we have won Phase 1 of the Move Health Data Forward Challenge.  This prestigious challenge is staged by The Department of Health and Humans Services’ Office of the National Coordinator for Health Information

3 Reasons You Need a Virtual Data Room

3 Reasons You Need a Virtual Data Room The top performing businesses in 2016 will perfect the art of connection — in fact, this economy has been labeled the Connection Economy. Consider the largest “taxi company” doesn’t own a car (Uber); the largest “hotel chain” doesn’t own a building (AirBnB); and the

HHS announces Phase 1 winners of the Move Health Data Forward Challenge

Proposals designed to help consumers share their personal health data easily and securely The Department of Health and Humans Services’ Office of the National Coordinator for Health Information Technology (ONC) today announced the Phase 1 winners of the Move Health Data Forward Challenge. Winners were selected based on their proposals for using

Bridge Building: Harnessing the Power of Great Partnerships with Laserfiche

We live in a connected world where we are meant to succeed through partnerships: the Wright Brothers introduced us to fixed-wing flight and opened the world to air travel; Lennon and McCartney were the creative force behind the Beatles—one of the most influential music bands in history; Larry Page and

Compliance: Why It Matters and How to Achieve It

Compliance: Why It Matters and How to Achieve It Why Compliance? According to a recent report on data security compliance, industries ranging from retail to healthcare to banking claim that protecting data to comply with corporate policies, industry regulations, or data privacy laws is very important, especially in sectors which are highly

Structure Security Conference 2016 – Three Themes

This week, we attended the Structure Security conference in San Francisco’s Presidio Golden Gate Club. It was billed as a conference that “will highlight the best practices that security professionals are using to protect some of the world’s largest companies and institutions, and examine the future of security products, services,

Attorneys: Is Your Information Governance Rock Solid?

Attorneys: Is Your Information Governance Rock Solid? Great architecture begins with a rock-solid foundation. Builders envision elaborate structures, but when the foundation is not firm, trouble is sure to follow. At best, a building leans; at worst, it completely topples over. In the Information Age, businesses, especially law firms, don’t

(IN)Secure Magazine: Hyper-Evasive Threats are Killing Sandboxing

A new generation of hyper-evasive malware is defeating legacy sandboxing technology and driving new security countermeasures underpinned by the elastic processing capacity of the cloud, as Cyren’s VP of Threat Research explains in an article in the September issue of (IN)SECURE Magazine.  In the article, Sigurdur Stefnisson reviews the evolution

Windows Media Player DRM Used for Malware (Again..)

Movie and TV watchers who download pirated content have long been warned of the potential for malware that might accompany their chosen media. Now use is again being made of Digital Rights Management (DRM) functionality — designed to prevent piracy — to distribute malware. The new attack, brought to Cyren’s