Researchers explore adapting geolocation technology to identify where data reside on the cloud so organizations can comply with IT security laws and regulations, RSA Chief Technology Officer Bret Hartman says.
As 2010 draws to a close, federal regulators have a long list of unfinished business in drafting regulations and launching programs to protect patient privacy and bolster information security, as mandated under the HITECH Act.
Not having an IT security certification doesn't disqualify you from getting that next job or promotion, but it could be a factor. Here are our picks of the five IT security certifications that will be most in demand in the new year.
The National Institute of Standards and Technology issues two special publications: SP 800-119, Guidelines for the Secure Deployment of IPv6 and SP 800-135, Recommendation for Application-Specific Key Derivation Functions.
The most important healthcare information security trend for the year ahead is the rush to implement electronic health records while taking advantage of all their security features, says Dixie Baker, a well-known security expert who's advising federal regulators on policy issues.
Geisinger Health System has notified about 3,000 patients about a breach incident in which a physician inappropriately e-mailed unencrypted health information from his work computer to his home computer.