article thumbnail

IoT Adoption in Healthcare Brings Security Opportunities

CIO

By Anand Oswal, Senior Vice President and GM at cyber security leader Palo Alto Networks Connected medical devices, also known as the Internet of Medical Things or IoMT, are revolutionizing healthcare, not only from an operational standpoint but related to patient care. Many connected devices ship with inherent vulnerabilities.

IoT 202
article thumbnail

LMS365, a learning management system built into Microsoft 365 and Teams, raises $20M

TechCrunch

Or they can import pre-existing courses or quizzes constructed elsewhere and stored in the SCORM or AICC format , which can be useful for general industry-specific training for cybersecurity, or regulatory compliance. Holst joined LMS365 last year from secure messaging company Wire , where he previously served as chief revenue officer.

System 248
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity Q&A with Dave Elfering, VP information security at Werner Enterprises

Sailpoint

Dave Elfering, currently Vice President of information security has also witnessed a considerable amount of growth and change over his career when it comes to information security. In 1997, Elfering began working at Werner as a project manager to help the company build its online presence and secure its data.

article thumbnail

A Day in the Life of a Business-Aligned Cybersecurity Leader

Tenable

The future belongs to cybersecurity leaders who can align their objectives with an understanding of business risk. I've been working in cybersecurity for 20 years. I've run intrusion detection programs and security operations centers and was responsible for policy and compliance of all those components.

article thumbnail

From Solar Sunrise to Solar Winds: The Questionable Value of Two Decades of Cybersecurity Advice

Haft of the Spear

While the Ware Report of 1970 codified the foundations of the computer security discipline, it was the President’s Commission on Critical Infrastructure Protection report of 1997 that expanded those requirements into recommendations for both discrete entities as well as the nascent communities that were growing in and around the Internet.

Security 102
article thumbnail

Data Access Governance for Healthcare Privacy Compliance

Saviynt

Saviynt’s identity-based data access governance (DAG) offers healthcare organizations a way to meet stringent compliance mandates while providing the best patient care possible. . The Security Rule, governing electronic Personal Health Information (ePHI), was released in 2003.

article thumbnail

FreshBooks reaches $1B+ valuation with $130.75M for its SMB-focused accounting platform

TechCrunch

FreshBooks , a Toronto-based cloud accounting software company focused on SMBs, announced today it has secured $80.75 In 2003, FreshBooks’ co-founder Mike McDerment was running a small design agency. For example, he said, more business owners are working to become digitally enabled to meet local tax and invoice compliance systems. .

SMB 258