Latest news with #HIPAA


Business Wire
5 hours ago
- Business
- Business Wire
Thales Launches File Activity Monitoring (FAM) to Strengthen Real-Time Visibility and Control Over Unstructured Data
MEUDON, France--(BUSINESS WIRE)-- Thales today announced the launch of Thales File Activity Monitoring, a powerful new capability within the Thales CipherTrust Data Security Platform that enhances enterprise visibility and control over unstructured data, enabling organizations to monitor file activity in real time, detect misuse, and ensure regulatory compliance across their entire data estate. As the only integrated platform provider that secures structured and unstructured data, Thales provides comprehensive monitoring and auditability for data types that were previously difficult to track. 'As unstructured data grows rapidly across distributed environments, organizations need more integrated ways to track and safeguard their most sensitive information,' Todd Moore, Vice President of Data Security Products at Thales, said. In today's evolving threat landscape, organizations must gain tighter control over unauthorized access and misuse of unstructured data, which according to IDC represents 90% of all worldwide data. File Activity Monitoring enables security teams to analyze and monitor the activity of unstructured data, including unexpected copying, downloading, and sharing of files such as emails, chat logs, media files, and application logs that can contain sensitive data. Real-time alerts, analytics, and encryption tracking further accelerate threat insights and protect sensitive data across the enterprise. This reduces exposure risks, supports compliance with standards like GDPR, HIPAA, and PCI DSS, and strengthens organizations' overall data security posture. 'Thales' innovative approach to File Activity Monitoring tackles key challenges like blind spots in hybrid environments, offering real-time visibility and smart anomaly detection — a potential game-changer for teams overwhelmed by false positives. By striking the right balance of depth and simplicity, FAM shows promise in helping us strengthen the SOC without added complexity. With tighter SIEM integration, it can sharpen response and let teams focus on what matters most. We're excited to see how FAM evolves and enhances our data security,' Leila KUNTAR, Principal Information Security Engineer, Amadeus, said. 'As unstructured data grows rapidly across distributed environments, organizations need more integrated ways to track and safeguard their most sensitive information,' Todd Moore, Vice President of Data Security Products at Thales, said. 'With File Activity Monitoring, Thales reinforces its leadership in enterprise data security by delivering real-time insight, intelligent automation, and unified visibility through a single, powerful platform.' Thales has been a leader in digital security for decades in structured database activity. Building on this extensive expertise, customers can expect the same world-class experience that they've had with Thales, now extended to encompass unstructured data protection. File Activity Monitoring strengthens DSPM by enabling security teams to: Discover, classify, observe, and control sensitive data across on-premises, hybrid, and multicloud environments Pinpoint where sensitive data resides, who has access, and whether it's properly secured, in real time, allowing detection of suspicious behavior including unauthorized copying, downloading, or sharing Transform static classification into dynamic risk intelligence through behavioral context Apply strong encryption and other remediation techniques, including reconstruction of incidents quickly with audit logs in the event of a breach or policy violation and enabling strong encryption, to protect compromised or at-risk data Built-in GenAI tools simplify audits, boost response, and cut complexity To further simplify compliance and security operations, File Activity Monitoring includes a Generative AI-powered Data Security Assistant. This integrated chatbot helps teams query audit data, generate custom reports, and streamline compliance workflows, reducing the burden on IT and security professionals and making it easier to meet regulatory obligations. 'As technology evolves rapidly, our controls must be flexible enough to keep pace without adding complexity,' Moore said. 'Automation and intelligence help overwhelmed security teams scale operations and focus on what matters most. With tools like our chatbot, they can ask natural language questions and get instant, actionable answers, accelerating response times and improving operational efficiency.' About Thales Thales (Euronext Paris: HO) is a global leader in advanced technologies for the Defence, Aerospace, and Cyber & Digital sectors. Its portfolio of innovative products and services addresses several major challenges: sovereignty, security, sustainability and inclusion. The Group invests more than €4 billion per year in Research & Development in key areas, particularly for critical environments, such as Artificial Intelligence, cybersecurity, quantum and cloud technologies. Thales has more than 83,000 employees in 68 countries. In 2024, the Group generated sales of €20.6 billion. Thales Group Cybersecurity Solutions | Thales Group
Yahoo
15 hours ago
- Business
- Yahoo
iDox.ai Launches Redaction Engine That Learns You: Personalized AI Now Available
AI-powered redaction software now adapts to document types, user behavior, and organization-specific needs with ongoing learning and customization features Fremont, California, June 09, 2025 (GLOBE NEWSWIRE) -- has launched a significant enhancement to its document redaction tool platform, Redact, with the introduction of Personalized AI, a suite of features that allows redaction tools to intelligently adjust based on document type, redaction history, and user Logo The Personalized AI update addresses the growing demand for smarter and more adaptable document processing in industries handling sensitive information, including legal, healthcare, finance, and law enforcement. Rather than relying on static rules, Redact now learns over time, providing users with redaction tools that become increasingly accurate and tailored to their workflows. Key components of the release include: Document Type Recognition: The AI automatically identifies document categories—such as contracts, medical records, or police reports—and adjusts its logic to match relevant redaction standards. This includes context-aware entity detection, like patient identifiers in medical files or license numbers in law enforcement records. Adaptive Entity Recognition: The system identifies and redacts sensitive content based on prior user actions, learning from ongoing redaction behavior to improve future performance. Regulation-Aware Data Profiles: Now supports a broad range of sensitive information types—including PII, PHI, racial covenants, and key business and financial data—with built-in awareness of compliance standards like HIPAA, GDPR, and FOIA. Manual Edits and Overrides: Users retain full control with the ability to fine-tune or override AI suggestions through a real-time editing interface. Whitelisting Functionality: Organizations can preserve specific terms or phrases from redaction, such as job titles or internal codes, improving accuracy and consistency. User and Team Learning: The system evolves with each user and team's redaction patterns, allowing it to provide more precise, context-appropriate suggestions as it accumulates insights. 'Our mission with Personalized AI is to deliver smarter, more human-aware redaction,' said Jeremy Wei, Founder of 'It's about context, control, and continuously improving performance tailored to each organization's needs.' The Personalized AI capabilities are now available to all current users of Redact. This release strengthens position at the forefront of AI-driven redaction by uniting adaptive personalization with deep regulatory awareness, enabling organizations to safeguard sensitive data while keeping pace with changing compliance requirements. About Designed for compliance-intensive environments, leverages artificial intelligence to automate and optimize document workflows across industries, with a primary focus on protecting sensitive data through features like PDF redaction, data security, and extraction. CONTACT: Gregory Sallis media@ while retrieving data Sign in to access your portfolio Error while retrieving data Error while retrieving data Error while retrieving data Error while retrieving data
Yahoo
19 hours ago
- Business
- Yahoo
Business Integra Launches Mission-Ready Healthcare Staffing Solutions Backed by AI Technology
BETHESDA, Md., June 9, 2025 /PRNewswire/ -- Business Integra (BI), a leader in mission-critical talent solutions, is proud to announce its official entry into the healthcare and wellness staffing sector. With a proven track record of supporting federal missions, BI now delivers rapid, AI-powered allied staffing services to support federal and commercial clients across the nation. Understanding the urgency and sensitivity of healthcare staffing, BI provides credentialed professionals faster than anyone else. Their pipeline includes certified talent across specialties such as Acute Care, LTC, Post-Acute Care, Corrections, Home Health, Primary Care, and Ambulatory Care. The BI promise includes: Rapid Deployment of Professionals: Surge staffing in under 48 hours, including medical, behavioral, and allied health experts. Certified & Credentialed Talent Pool: A nationwide network of nurses, EMTs, therapists, and personal trainers licensed in all 50 states. AI-Powered Sourcing + Human Oversight: Intelligent vetting and location-based matching with smart dashboards. Wellness for the Workforce: AI and CMMI-ML5-aligned burnout monitoring and field staff support with over 92% retention on long-duration contracts. End-to-End Allied Staffing: Compliant with HIPAA, NIST, and VA/DoD guidelines, ensuring secure and audit-ready processes. Cleared Talent Available: We also feature cleared personnel up to TS/SCI level for secure environments and federal healthcare missions. "Our goal is to bring flexibility and reliability to healthcare staffing while maintaining our commitment to excellence in service delivery," said Prathiba Ramadoss, CEO/Founder at BI. Further, Philip Braccio, Sr. VP Client Solutions added, "We've built a robust pool of professionals—from Registered Nurses (RN) and Licensed Practical Nurses (LPN) to EMTs and Allied Health Professionals—ready to meet evolving needs across all 50 states." With this expansion, BI continues to demonstrate its commitment to supporting federal and commercial health initiatives with excellence, speed, and purpose with an intent to keep communities healthy. Explore BI's healthcare staffing capabilities here: About Business Integra: Business Integra is an award-winning, global provider of information technology, cybersecurity, aeronautic engineering, scientific and mission support services. We are committed to producing efficient and ethical results that cut costs, reduce risks, secure data, and advance human progress via cybersecurity, IT, engineering and mission support services. We are a CMMI Level 5 organisation (re-certified in 2025) with a strong record in mission-support, BI is redefining healthcare staffing for the modern era. View original content to download multimedia: SOURCE Business Integra Inc Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data


Business Wire
21 hours ago
- Health
- Business Wire
92% of Healthcare IT Leaders Believe They're Prepared to Prevent Email Breaches. They're Not.
SAN FRANCISCO--(BUSINESS WIRE)--A new Paubox report shows just how off the mark healthcare IT leaders are about their email security. Based on first-party data from 150 U.S.-based healthcare IT leaders, the report reveals a dangerous confidence gap: leaders think they're covered, but the data says otherwise. 92% of healthcare IT leaders believe they're prepared to prevent email breaches. They're not. 'Healthcare IT is dangerously overconfident about email security,' reveals that 92% of healthcare IT leaders believe they're prepared to prevent email breaches. They're not. Most rely on outdated systems, tools that slow people down, and processes that actively undermine compliance. Organizations overestimate their security readiness, underinvesting in email security while forcing staff to work around clunky tools. Key findings from the report: 86% say their current tools create workflow friction, causing staff to bypass security processes 56% spend less than 10% of their security budget on email—despite it being the top threat vector Only 44% use AI-powered threat detection, even though 89% say it's critical 'We've seen email threats evolve faster than some of the tools meant to stop them,' said Hoala Greevy, Founder and CEO of Paubox. 'It's not just about phishing anymore—it's about deception at scale.' The report outlines the most common barriers IT leaders cited to adopting secure, compliant email solutions, including implementation complexity (54%), lack of vendor support (53%), and integration challenges with legacy systems (41%). These roadblocks create an environment where staff routinely bypass secure systems, putting patient data at risk. 'As a cybersecurity consulting practice engaging with hundreds of organizations annually, we consistently observe a critical gap in email security practices,' says Andrew Hicks, Partner and National HITRUST Practice Lead at Frazier & Dieter Advisory, LLC. 'Too often, organizations rely on infosec policies, user training, or manually enforced controls—rather than implementing automated, policy-driven email encryption solutions. This overreliance on human-dependent safeguards introduces unnecessary risk and undermines the integrity of outbound email protection strategies.' 'I see the gap in time between new vulnerabilities emerging and budgets catching up to them,' says Tony Cox, CIO for Henderson Behavioral Health. 'That delay? That's where the attackers live.' Why it matters: PHI isn't confined to EHRs. It flows through email, attachments, referrals, and coordination chains every day. Without strong email security safeguards in place, your compliance framework is one click away from collapse. Download the full report here: About Paubox Paubox offers HIPAA compliant communication solutions that empower healthcare organizations of any size to simply and securely communicate. Our suite of solutions includes HIPAA compliant encrypted email, inbound email security, HIPAA compliant email marketing, and HIPAA compliant email API for transactional communications. Our customers love our HITRUST certified solutions and we have industry-topping G2 ratings (4.9/5 stars). Learn more at
Yahoo
21 hours ago
- Health
- Yahoo
92% of Healthcare IT Leaders Believe They're Prepared to Prevent Email Breaches. They're Not.
SAN FRANCISCO, June 09, 2025--(BUSINESS WIRE)--A new Paubox report shows just how off the mark healthcare IT leaders are about their email security. Based on first-party data from 150 U.S.-based healthcare IT leaders, the report reveals a dangerous confidence gap: leaders think they're covered, but the data says otherwise. "Healthcare IT is dangerously overconfident about email security," reveals that 92% of healthcare IT leaders believe they're prepared to prevent email breaches. They're not. Most rely on outdated systems, tools that slow people down, and processes that actively undermine compliance. Organizations overestimate their security readiness, underinvesting in email security while forcing staff to work around clunky tools. Key findings from the report: 86% say their current tools create workflow friction, causing staff to bypass security processes 56% spend less than 10% of their security budget on email—despite it being the top threat vector Only 44% use AI-powered threat detection, even though 89% say it's critical "We've seen email threats evolve faster than some of the tools meant to stop them," said Hoala Greevy, Founder and CEO of Paubox. "It's not just about phishing anymore—it's about deception at scale." The report outlines the most common barriers IT leaders cited to adopting secure, compliant email solutions, including implementation complexity (54%), lack of vendor support (53%), and integration challenges with legacy systems (41%). These roadblocks create an environment where staff routinely bypass secure systems, putting patient data at risk. "As a cybersecurity consulting practice engaging with hundreds of organizations annually, we consistently observe a critical gap in email security practices," says Andrew Hicks, Partner and National HITRUST Practice Lead at Frazier & Dieter Advisory, LLC. "Too often, organizations rely on infosec policies, user training, or manually enforced controls—rather than implementing automated, policy-driven email encryption solutions. This overreliance on human-dependent safeguards introduces unnecessary risk and undermines the integrity of outbound email protection strategies." "I see the gap in time between new vulnerabilities emerging and budgets catching up to them," says Tony Cox, CIO for Henderson Behavioral Health. "That delay? That's where the attackers live." Why it matters: PHI isn't confined to EHRs. It flows through email, attachments, referrals, and coordination chains every day. Without strong email security safeguards in place, your compliance framework is one click away from collapse. Download the full report here: About Paubox Paubox offers HIPAA compliant communication solutions that empower healthcare organizations of any size to simply and securely communicate. Our suite of solutions includes HIPAA compliant encrypted email, inbound email security, HIPAA compliant email marketing, and HIPAA compliant email API for transactional communications. Our customers love our HITRUST certified solutions and we have industry-topping G2 ratings (4.9/5 stars). Learn more at View source version on Contacts Media Contact: Dawn Halpinpress@ Erreur lors de la récupération des données Connectez-vous pour accéder à votre portefeuille Erreur lors de la récupération des données Erreur lors de la récupération des données Erreur lors de la récupération des données Erreur lors de la récupération des données