ICSA Labs has partnered with IHE USA to create a new testing and certification program addressing advanced interoperability capabilities in Electronic Health Records, Health Information Exchanges and Patient Care Devices.
As an Accredited Test Lab and Office of the National Coordinator Authorized Certification Body (ONC-ACB), ICSA Labs is authorized by the US government to test and certify Health Information Technology products that support Meaningful Use.
Secure Socket Layer - Transport Layer Security (SSL-TLS) technology is an important component of a comprehensive enterprise security strategy. SSL-TLS is a widely used protocol for secure network communications.
A firewall is a single point between two or more networks where all traffic must pass (choke point); traffic can be controlled by and may be authenticated through the device, and all traffic is logged.
NAPS will verify that a network attached peripheral will not introduce vulnerabilities to the network where it is installed, and is not vulnerable to exploitation itself, while still providing its intended services to users.
Enterprises need to know that their mobile apps safeguard sensitive customer and internal data while being safe to use. ICSA Labs provides this reassurance to enterprises through its mobile app testing program.
DESC, a leader in providing innovative housing, behavioral health and crisis services to chronically homeless individuals, announced that it receivedONC HIT 2014 Edition Electronic Health Record (EHR) certification for its internallydeveloped client service tracking software, CHASERS version 1.5.
Mana Health's ManaPortal™ version 1.0.0, has achieved ONC HIT 2014 Edition Modular EHR certification, which designates that the software is capable of supporting eligible providers and hospitals with meeting the Stage 1 and Stage 2 Meaningful Use measures required to qualify for funding under the American Recovery and Reinvestment Act (ARRA).
ICSA Labs will be issuing Excellence in Information Security Testing (EIST) awards on Monday, April 20 at 6pm PST in the Verizon Booth (N3101) at the RSA Conference in San Francisco. The awards recognize clients that have achieved successful completion of 10, 15, or 20 years of continuous ICSA Labs information security testing.
Prepare your enterprise to conduct individualized self-assessments of risk, so you can make realistic decisions on how to avoid cyber threats. The 2015 DBIR expands its investigation into nine common threat patterns and sizes up the effects of all types of data breaches, from small data disclosures to events that hit the headlines.
ICSA Labs' EIST awards recognize vendors for outstanding achievement in the area of information security certification testing with ICSA Labs. The award is based on a company achieving ten, fifteen or twenty years of continuous testing with ICSA Labs. Visit the EIST Awards page for more information.
BY Brian Monkman, Network Security Programs Manager
August 3, 2015
Some cloud security experts have argued that firewalls are irrelevant, while firewall experts maintain that cloud security is ineffective. The truth is that neither of these assertions are true. Cloud security solutions can be very effective, and firewalls are certainly not dead. It is up to IT professionals to learn how to make these both co-exist.
As consumers increasingly turn to their mobile phones for shopping, banking, working and internet browsing, cybercriminals have similarly begun to evolve their tactics to keep up with the growth in mobile phone usage.