Guide
Avoiding Compliance Surprises - Financial Technology
Compliance is so important in today’s business economy (some might say it is the economy of business) because it is the “pass” that allows you to play. Ensure it, and you can play anywhere.
Go without it, and you’re benched. From fees to jail time, PR costs to reputational damage, being caught not complying with legal standards for protecting critical systems, information, and proprietary...
Blog
Proposed HIPAA Update Makes Yearly Pen Testing Mandatory
By Katrina Thompson on Thu, 07/17/2025
In early 2025, significant changes to the HIPAA Security Rule were proposed by the Office of Civil Rights for the Department of Health and Human Services (OCR).
The proposed update to the HIPAA Security Rule, published on January 6, 2025, introduces a significant new requirement: all covered entities and business associates must conduct penetration...
Blog
Adapting to a Changed World: 6 Cybersecurity Predictions for 2021
Tue, 12/22/2020
As a new year looms bright with possibility in front of us, how can we prepare for a world that looks profoundly different than it did a year ago? On the cybersecurity front, we can always anticipate continuing battles with familiar foes, as well as a few new challenges on the horizon. Though we may not have a crystal ball, based on our observations and discussions, here are six predictions for...
Case Study
From Surviving to Thriving: How a Large Healthcare Organization Established a Comprehensive Identity and Access Management Approach
Overview
Healthcare organizations today face extraordinary challenges in a dynamic, complex landscape. During the last two decades, the healthcare industry has seen increasing regulations, an acceleration of technology and workforce growth, acquisitions and consolidation, and the pressure to increase operational efficiencies and decrease overall costs, while meeting growing patient demands....
Blog
Five Major Drivers of IGA and PAM for Financial Services Organizations Today
Fri, 09/25/2020
Financial services information security continues to be a top priority across the entire financial sector—and for good reason. The Verizon Data Breach Investigations Report found that financial profit or gain was the primary motivation in 71 percent of all information security incidents, making financial services organizations a prime target for attack.
According to the Bitglass’ Financial Breach...
Blog
How to Deal with Changing Financial Cybersecurity Regulations
Thu, 08/27/2020
Late last year the New York State of Financial Services (DFS) announced that New York would be proposing a "first in the nation" rule on cyber-security to go into effect on March 1, 2017 which would impact any bank, insurance company and anyone else covered by DFS. The rule requires any regulated company design a cybersecurity program that assesses its risks to ensure the safety and soundness of...
Video
8 Ways to Tackle the Biggest Access-Related Challenges in Financial Services
Mon, 08/17/2020
Financial services organizations today face extraordinary challenges in a dynamic, complex landscape. During the last two decades, the financial services sector has seen everything from increasing cybersecurity threats, data breaches, and cyberattacks to intensified regulatory compliance, an acceleration of digital transformation, and the pressure to increase operational efficiencies and decrease...
Blog
Healthcare Identity Governance in the Era of COVID-19: Five Critical Issues Your Organization Can’t Afford to Overlook
Wed, 07/15/2020
The impact of COVID-19 has been far-reaching across nearly every sector. But none has been so greatly disrupted as the healthcare industry. Managing through this crisis has required healthcare systems to expand some aspects of their workforce and redeploy others virtually overnight in order to transform the way they offer services to patients.
Redeploying resources, leveraging a mobile workforce,...
Blog
How Financial Services Organizations Can Mitigate Their Top Identity-Related Access Risks
Mon, 06/01/2020
Financial services organizations face numerous challenges in a constantly changing landscape. With increased cybersecurity threats, intensified regulatory requirements, an acceleration of digital transformation, large-scale mergers and acquisitions, and growing customer expectations, these organizations must pursue strategies and programs that mitigate risks, safeguard valuable data, and protect...
Blog
Interview with a Healthcare Security Expert: William "Buddy" Gillespie, HCISPP
Thu, 05/28/2020
In November we started a wonderful webinar series with industry leader William "Buddy" Gillespie, HCISPP and we introduced that series with a sit down interview. Yesterday, we concluded the series with a webinar titled "Healthcare 2020: Focus on the Future". While the webinar series may be over, our partnership with Buddy will continue and we would like to continue to showcase his knowledge...
Blog
How to Mitigate Data Breaches in Healthcare IT
Wed, 05/27/2020
What once was only science fiction is now our reality, anything and everything can be hacked. For healthcare providers, ‘anything’ includes not only patient records and claims information, but sentient things like drug pumps and pacemakers. In addition, healthcare has operational functionality that make this space particularly challenging. The mobility challenge is particularly unusual because the...
Video
Healthcare Identity Governance 101: Six Proven Strategies for Tackling the Biggest Healthcare Information Security Challenges
Tue, 05/26/2020
Healthcare organizations today face extraordinary challenges in a complex landscape. With increasing regulations, the acceleration of technology, and the demand to do more with less, health systems must address these issues head on, while staying focused on delivering quality patient care.
Data breaches in healthcare cost more than $6.45 million on average—higher than any other industry. So the...
Video
Intelligently Mitigate Your Biggest Healthcare Identity Risks
Tue, 05/26/2020
Take the next step in addressing your healthcare organization’s most pressing access-related risks. Watch this on-demand video to learn how you can reveal hidden access risks in your health system to arm yourself with actionable insights.
By increasing your access risk intelligence, you can:
Discover inappropriate access risks prior to internal audits.
Diagnose access risks instantly, and gain...
Blog
Five Major Reasons Healthcare Organizations Need Identity Governance
Tue, 05/26/2020
Ready to better protect your healthcare organization so you can focus on what matters most?
Blog
How to Tackle the Top Five Healthcare Information Security Challenges
Tue, 05/26/2020
Ready to learn more about protecting your healthcare organization with leading-edge identity governance?
Case Study
WellSpan Health
Overview
WellSpan selected Core Security’s Identity Governance & Administration Solution to ensure that access to information, buildings and systems were given to the right people at the right time.
Key Results Include:
Increased operational efficiency and transparency
Strengthened security
Improved compliance
Delivering fast time to value and the lowest total cost of ownership
...
Case Study
Large Health System Turns to Core Privileged Access Manager (BoKS) for Server Management & System Security
Overview
A leading not-for-profit health system in the United States, with multiple hospitals, rehabilitation centers, physician clinics, mental health facilities, independent living centers, and home health agencies, employs more than 9,000 individuals, including nearly 1,400 physicians. Collectively, the entities within the healthcare organization also maintain more than 1,500 licensed beds...