How do we provide mobile applications to our users that fulfill their need for immediate access, but also provide them with assurance that their information is safe? Here are four fundamentals.
Recent events such as Superstorm Sandy have brought new attention to the business continuity discipline. As business continuity grows in significance, so does the desire to measure its effectiveness.
Making an appearance twice a year just to ask for additional budget will not cut it. The CISO needs to make sure the board members know that he or she is a true enabler of the business.
The CISO of Beth Israel Deaconess Medical Center calls on the Food and Drug Administration to take bold action to help ensure the security of medical devices, which are vulnerable to malware.
Across the board, the job market in the U.S. is extremely competitive. Yet, fraud examiners are in demand -- and there are some tactics you can use to give yourself an edge when seeking a new job.
The continuing loss of data to China suggests that the federal government should carefully assess the cybersecurity implications associated with the expansion of Chinese cloud and mobile providers in the U.S.
When you and I say 'cloud,' we may think of two very different things, ISACA leader Peter Spier writes. Partly this stems from a lack of common definition on the term. Read on to see how such confusion can be overcome.
I don't care how old you are, there will be demand for this kind of talent for the rest of your career. However, if AppSec was easy, the supply of talent would meet the demand. That's not the case.
As mobile devices become ubiquitous in healthcare, more precautionary measures are needed to ensure patient confidentiality. To prevent data breaches, hospitals, clinics and others need to take five essential steps.
Job hunting today is a bit like a game. It can be confusing and even a little scary. And if you haven't played in a while, you may be mystified by how the rules and the playground have changed.
Secure is a possible state of affairs at a certain point in time. But rugged describes staying ahead of the threat over time. Rugged organizations create secure code as a byproduct of their culture.
The great thing about fraud examination is that you can really play to your own strengths when choosing a career. The following six job roles are just a few of the career paths a fraud examiner might take.
Whether we are dependent on a supply chain or part of a supply chain, we are all vulnerable to disruptions beyond our control. What can we do to work towards achieving our supply chain resilience? Here are some tips.
Security personnel should be required to prove not only that they know how to do things right, but also that they know how to do the right thing. They must demonstrate commitment to ethical behavior.
Blaming developers for application security problems is the wrong thing to do. Here are five reasons why application security development fails in the software development ecosystem of many companies.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.