No Password Required: MITRE Engage Lead, Innovator in Cyber Deception, and Dance Community Builder
Podcast: Interoperability: Health Care's Next Disruptor Is openEHR - Diagnosing Health Care
Podcast: Interoperability: A New Vision Through openEHR - Diagnosing Health Care
Podcast–Interoperability: How Far We’ve Come and Where We’re Going - Diagnosing Health Care
Interview With Ayesha Minhaj, Google - Digital Planning Podcast
Inside Privacy Law: The Regulation of Personal Data
Oklahoma: Changing Data Privacy as We Know It?
M365 in 5 – Part 7: Teams Audio/Video (A/V) Conferencing
M365 in 5 – Part 3: OneDrive for Business – Protected personal collaboration
M365 in 5 – Part 2: SharePoint Online – The new file-share environment
Healthcare Tech: How Are Licensing Agreements Bridging the Industry Divide?
Compliance Perspectives: The Ethics of Data
Tackling Modern Attachment and Link Challenges in G-Suite, Slack, and Teams
From NC State to Changing the State of Health Information Networks, with Medicom Technologies’ Malcolm Benitz
U.S. Department of Defense Awards Contract to Secure Sensitive Data With Blockchain
Global privacy in the age of COVID-19
Compliance Perspectives: Permissible Disclosures under HIPAA, Especially in the Time of COVID-19
Compliance Perspectives: COVID-19 and GDPR
Jones Day Presents: Antitrust, Collusion, and Blockchains
[WEBINAR] Laying the Foundation for Maximizing Benefits Around Emerging Technologies
The European Supervisory Authorities have published a joint report on the feasibility of further centralization of the reporting of major ICT-related incidents by financial entities to competent authorities. The ESAs' joint...more
The Digital Operational Resilience Act (DORA) is an EU regulatory framework, aimed at enhancing the financial sector’s ability to withstand and recover from ICT (information and communication technology) disruptions....more
The Federal Acquisition Regulatory (FAR) Council on Oct. 3, 2023, issued two proposed rules to partially implement President Biden's Executive Order on Improving the Nation's Cybersecurity. The first proposed rule imposes...more
Are Automakers Making Sufficient Efforts to Protect Customer Data? With the ever-expanding Internet of Things, data privacy is a growing concern in today’s digital age. The automotive industry is no exception. The National...more
There have been several recent governmental actions which highlight the balance between securing electronic patient information and the need for interoperability and appropriate exchange of such information. This article will...more
As we all try to keep up with the Metaverse and as the healthcare system wilts under a data deluge, the convergence of realities in a shared online space is not merely a chance for practitioners and patients to find each...more
On December 29, 2017, the Standardization Administration of China, jointly with the PRC General Administration of Quality Supervision, Inspection and Quarantine, issued the Information Security Technology – Personal...more
Just days after the summit between the U.S. and North Korea, the Federal Bureau of Investigation (FBI) and the Department of Homeland Security issued a warning about a malicious malware, a Trojan malware variant known as...more