• Subscribe to our feed
  • Like us on Facebook
  • Follow us on Twitter
  • Join Us on LinkedIn

What is the cost of non-compliance in Health Care?

by Mike Hopkin 27 December 2013

Complying with health care regulations requires time, effort and financial investment. Though it may be high, this investment pales in comparison to the cost of non-compliance. What is the true cost of compliance for your organization? More importantly, what is the cost of non-compliance?  The Ponemon Institute and Tripwire did an extensive research project and [...]

Read More →

Attachmate’s Luminet named to Database Trends and Applications trend-setting products list

by Sam Morris 4 December 2013
Thumbnail image for Attachmate’s Luminet named to Database Trends and Applications trend-setting products list

Sometimes we can’t help but be proud of our children, and that’s certainly the case here. Attachmate Luminet, our solution aimed at helping organizations combat insider data misuse and privacy violations, was named to the Database Trends and Applications (DBTA) list of Trend-Setting Products in Data for 2014. According to DBTA, this list “salutes the products setting [...]

Read More →

What Can Cyber Fraud Teach You About Preventing Insider Fraud?

by Mike Hopkin 3 December 2013

Earlier this year, federal prosecutors charged five men in the largest cyber fraud case ever filed in the United States. The offense? Theft of credit and debit card information that cost companies – many of them blue chip enterprises – more than $300 million. And while none of the alleged perpetrators were company insiders, the [...]

Read More →

Why Companies Ignore Fraud Prevention Failures

by Christine Meyers 1 August 2013

Failure to recognize or respond to workplace fraud costs U.S. businesses millions each year. While circumstances leading to fraudulent behavior vary widely among companies, recent studies may reveal why some institutions ignore illegal activity – even when it’s happening in plain view. Here are some reasons companies turn a blind eye to expensive, systemic insider [...]

Read More →

Reasons Why Corporate Compliance is Good for Business

by Christine Meyers 20 June 2013

Collecting data and preparing reports for an auditor can seem burdensome and confusing. With so many regulations in place, the paperwork never seems to end. But the regulatory process is actually good for your business. After all, regulations were put in place by industry groups and government agencies to protect the public and shareholder interests. [...]

Read More →

HIPAA and HITRUST for Healthcare: What’s the Difference?

by Christine Meyers 10 February 2013

Healthcare institutions are working hard to map audit and compliance efforts throughout their organization–especially across critical applications and mainframe systems with legacy applications. All of this effort will result in more secure EHRs and improvements in patient privacy protections. But in a world of constrained resources, where should care providers focus the bulk of their [...]

Read More →

Presidential Memo on Insider Threat: Big Brother or Sound Policy?

by Christine Meyers 5 December 2012

Recently, an Executive Memo was released addressing the vexing issue of insider threat within departments and agencies of the federal government. This presidential memorandum,“National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs,” was issued on Nov. 21, 2012. The text of the memo is captured below: This Presidential Memorandum transmits the [...]

Read More →

HITECH, Meaningful Use and the 5 Pillars of Health Outcomes

by Christine Meyers 8 November 2012

The Meaningful Use program was first established by the U.S. Federal Government as part of the 2009 HITECH Act. The goal was to foster the creation of the infrastructure needed to support healthcare reform. As the 2014 deadline for Meaningful Use Stage 2 draws closer, organizations are planning now for improvements in the way they [...]

Read More →

3 Ways Leading Companies Reduce Risk

by Christine Meyers 9 October 2012

The business risks—financial loss, failed audits, regulatory fines, and brand damage—of insider threats to your corporate data are too devastating to ignore. Here’s how learning from industry best practices can help you prevent these threats, including fraud and information leakage, and protect your business: Demand 100% visibility so nothing gets missed Capturing data in logs [...]

Read More →

3 Types of Insider Threat and How to Spot Them

by Christine Meyers 12 September 2012

Insider threats—the most challenging for organizations to address—are often difficult to spot and pose huge risks for your organization. While many of the motivations are the same, there are three distinct types of fraudulent insiders. Read part one of our series to understand who commits fraud. Part two will focus on what to look for [...]

Read More →