This article gives you a broad look at the Health Insurance Portability and Accountability Act (HIPAA) minimum necessary standard. You’ll learn about its requirements, exceptions, and how to implement it.
Posts by Category:
- SOC 2
- Privileged Access Management
- Identity and Access Management
- Role-Based Access Control
- ISO 27001
- Zero Trust
- Secure Access Service Edge
This article digs into Health Care Accountability and Portability Act (HIPAA) violations. Discover what they are and get examples of typical HIPAA violations in healthcare. Plus, learn how breaches are detected and reported and what you can do to protect your organization.
Access is at the heart of security and productivity. Not enough, and productivity drops. Too much, and you become unsecure. Learn how to balance both and cross the Access-Productivity gap.
Learn how Remote Identities helps you leverage SSH and k8s capabilities to capitalize on infrastructure workflow investments you’ve already made.
In 2020, the world came to a halt. We suddenly realized that many of the jobs we normally do in the office could be done just as efficiently (if not more) from the comfort of our homes. Two years later, how is remote work faring? Has the enthusiasm for remote work tapered off just like the pandemic? Let’s find out in this list of the latest statistics on remote work.
The cloud has changed the way we access and secure technical infrastructure, leaving teams lost in a tangle of resources. Thankfully, access doesn’t have to be this complicated. Join Hermann Hesse, VP of Solutions at strongDM, as he shares three costly but avoidable cloud infrastructure security challenges and what you can do to address them.
This article breaks down the different HIPAA penalties—including civil and criminal penalties—and the maximum penalties for HIPAA violations. Find out who is liable under HIPAA, what the most common HIPAA violations are, and how to ensure compliance and prevent HIPAA violations in your own organization.
Join strongDM CTO Justin McCarthy and a panel of experts as they discuss the challenges, complexities, and best practices of enterprise k8s adoption.
Is k8s governance a challenge for your team? Join strongDM’s CTO and a panel of experts to discover common pitfalls, plus tools + tricks to help manage them.
As a business, you need to have benchmarks to work against in all facets of your work. That's especially true when it comes to cybersecurity. In this area, there are two main groups that offer guidelines: The National Institute of Standards and Technology (NIST) and the International Organization for Standardization (ISO). What's the difference between the two, and which one should you follow? Here's what you need to know.
DevOps technologies are hard to manage. Throw a patchwork of tech across multiple clouds with developers, execs, and security working at cross-purposes, and people will quickly start to look for workarounds.
A closer look at what technical debt is, how it relates to infrastructure access, and why unwinding short-term workarounds can actually improve productivity.