[Log In] []

Exploring the science and magic of Identity and Access Management
Tuesday, March 19, 2024

Lost in Cyberspace

Humor, Identity
Author: Mark Dixon
Thursday, September 8, 2011
3:27 am

What did you lose, Ziggy?  Sometimes, I think I am losing my mind.

By the way, did you know that Dictionary.com defines “cyberspace” as “the realm of electronic communication?”  Such a mundane definition for such an intriguing subject!

Comments Off on Lost in Cyberspace . Permalink . Trackback URL
WordPress Tags: ,
 

The Growth of Social Media

Social Media
Author: Mark Dixon
Saturday, September 3, 2011
6:12 am

Did you know that Facebook has a population of over 600 million registered users – trailing only the nations of China and India? The following infographic from Search Engine Journal is a fascinating study of the growth of Social Media over the past few years.

The Growth of Social Media: An Infographic

Source: The Growth of Social Media: An Infographic

Comments Off on The Growth of Social Media . Permalink . Trackback URL
WordPress Tags:
 

Veriphyr Study: Protected Health Information (PHI) Privacy Breaches

Identity, Information Security
Author: Mark Dixon
Friday, September 2, 2011
5:51 pm

This afternoon, I received word that Veriphyr, a provider of SaaS Identity and Access Intelligence services, announced the results of new survey on Protected Health Information (PHI) privacy breaches. According to the report,

More than 70 percent of the organizations in the study have suffered one or more breaches of PHI within the last 12 months. …

Insiders were responsible for the majority of breaches, with 35 percent snooping into medical records of fellow employees and 27 percent accessing records of friends and relatives.

Some interesting statistics:

Top breaches in the past 12 months by type:

  • Snooping into medical records of fellow employees (35%)
  • Snooping into records of friends and relatives (27%)
  • Loss /theft of physical records (25%)
  • Loss/theft of equipment holding PHI (20%)

When a breach occurred, it was detected in:

  • One to three days (30%)
  • One week (12%)
  • Two to four weeks (17%)

Once a breach was detected, it was resolved in:

  • One to three days (16%)
  • One week (18%)
  • Two to Four weeks (25%)

79% of respondents were “somewhat concerned” or “very concerned” that their existing controls do not enable timely detection of breaches of PHI

52% stated they did not have adequate tools for monitoring inappropriate access to PHI

The report’s conclusion was not surprising:

Respondents who indicated strong satisfaction with their monitoring tools also tended to report fewer breaches of PHI and faster resolution times. The reverse is also true: respondents who indicated dissatisfaction with their monitoring tools tended to report more breaches and longer resolution times.
The morals of this story?
  • Cautiously trust, but verify the internal folks.  They are the biggest breach threat.
  • Do you want to tackle and solve your privacy breach problems? Good tools really do help.

 

Comments Off on Veriphyr Study: Protected Health Information (PHI) Privacy Breaches . Permalink . Trackback URL
 

Oracle Webcast: Escape the Quagmire with the Oracle Identity Platform

Identity
Author: Mark Dixon
Friday, September 2, 2011
4:29 pm

In an Oracle webcast on September 20th, Scott Bonnell, Sr. Director of Product Management, Oracle, and Naresh Persaud, Director of Product Marketing, Oracle, will explore how the Oracle identity platform can mobilize stalled deployments, allowing customers to accelerate identity projects.

This complimentary Webcast will show how the Oracle identity platform can:

  1. Mobilize and complete your identity management project
  2. Coexist with or replace your existing identity management point solution
  3. Reduce security risk and improve regulatory compliance
You can register for the webcast here.
Comments Off on Oracle Webcast: Escape the Quagmire with the Oracle Identity Platform . Permalink . Trackback URL
WordPress Tags: ,
 

Oracle Webcast: Analyzing the Identity Platform Versus Point Solution Approach

Identity
Author: Mark Dixon
Friday, September 2, 2011
4:08 pm

A couple of weeks ago, I blogged about a new Aberdeen Research Brief, “Identity and Access Management – Platform vs. Point Solution.” On September 15th, you can attend a webcast where Derek Brink, Vice President and Research Fellow, Aberdeen Group and Naresh Persaud, Director of Product Marketing, Oracle, will analyze the results of the Aberdeen study and explore how a platform approach can reduce the administrative cost, improve security and reduce audit exposure.

 

The webcast will show how :

Achieving a successful Identity Management program means integrating tools for administration, governance, sign-on, web-access control and authentication. Choosing an integrated suite or “platform” of solutions from a single vendor can have many advantages over choosing “point solutions” from multiple vendors.

You can register for the event here.

Comments Off on Oracle Webcast: Analyzing the Identity Platform Versus Point Solution Approach . Permalink . Trackback URL
 
Copyright © 2005-2016, Mark G. Dixon. All Rights Reserved.
Powered by WordPress.