Documents

MySQL Secured by SG™ A Shielded MySQL Virtual Instance With Encryption – April 2021 Download here: SG-TDE-MySQL Quick Installation Guide For GCP PostgreSQL Secured by SG™ A Secure PostgreSQL Virtual Instance – April 2021 Download here:SG-TDE-PostgreSQL Quick Installation Guide For GCP

What Are The Main Challenges Associated With Protecting HIPAA Data?

The HIPAA legislation requires that covered entities implement technical safeguards to protect all electronic Personal Healthcare Information or PHI whereas the HITECH Act mandates that a successful breach of “unprotected” ePHI must be publicly disclosed. Furthermore, the HIPAA Omnibus Rule holds business associates liable for non-compliance.

Protecting PHI – Technical Challenges

How to protect PHI against cyber threats and insider attacks?
According to recent reports over $1B in revenue is attributable to ransomware in 2016. 25% of healthcare entities utilizing the public cloud are not encrypting their data. 38% of those surveyed have…

MySQL And COTS OS – A Dangerous Mix

Commercial off-the-shelf (COTS) operating systems, which are used by most cloud providers to offer virtual servers or containers to their customers, pose their own set of challenges. Operating systems, meaning not only the kernel, but also all the associated libraries, services, and so on, are designed to cater to the widest possible range of applications and users.

How Does Server General Create Tamper-Resistant Logs?

Problem:

In the case of a regular server, an external or a malicious internal user may gain unauthorized access to the sensitive information and then perform acts to conceal the breach by removing or editing audit log files. These log files contain crucial information that is needed to prove regulatory compliance and to conduct forensic analysis in case of an actual breach.

Solution:

Why Not Trust The “root” User With Your Data?

These days attacks that are being launched on an organization’s computing infrastructure are becoming more sophisticated and potentially more damaging. Threats have escalated as IT organizations are increasingly being asked to provide more services. Security officers are fighting these threats on a daily basis, but