Blog

Keep Up-to-Date with Exostar Technology Experts

Read what Exostar technology experts are saying about the latest in identity, collaboration, risk, and supply chain.

Thwarting Intellectual Property Theft in Life Sciences

The Issue It’s happening everywhere. All the time. You just don’t see it. A thief, stealing your corporate secrets and […]

Read More
Cybersecurity, Healthcare Jan 12, 2016

Could your healthcare insurer be putting your organization at risk?

Cyber-based attacks pose a serious risk to organizations. Historically, business decisions were measured in dollars and cents. Now, they must […]

Read More
Cybersecurity, EPCS, Healthcare Jan 11, 2016

Healthcare: Are you posed to be the next big data breach victim in 2016?

Electronic medical records. E-prescribing. Online collaboration amongst patients, providers, and payers. These advances mean protecting personally identifiable information (PII) and […]

Read More

Best Practices in Cyber Supply Chain Risk Management (SCRM)

I recently attended a National Institute of Standards and Technology (NIST) meeting on Best Practices in Cyber Supply Chain Risk […]

Read More
Cybersecurity, EPCS Oct 27, 2015

Two Factor Authentication

What is two factor authentication and why is it important? When exploring cyber security or internal system security, perhaps you’ve […]

Read More