Jet Propulsion Laboratory IT Chief Technology Officer Tom Soderstrom is showing that a deliberate, methodical approach can lead to effective and secure cloud computing.
White House Cybersecurity Coordinator Howard Schmidt, in an exclusive interview, expresses optimism that Congress could enact significant cybersecurity legislation this year even if President Obama doesn't get all that he wants in an IT security bill.
Though Todd Park's primary focus is to identify ways to exploit IT to make the government run more efficiently, he'll collaborate with others to make sure technology the government employs is secure.
Consumer advocate Deven McGraw describes what she likes and doesn't like about the privacy and security provisions in the proposed rules for Stage 2 of the HITECH Act electronic health record incentive program.
Authorities link the suspects to attacks on U.S. and foreign government websites, financial services companies, government contractors and media companies.
The passage of the HITECH Act and adoption of Electronic Health Records (EHRs) are creating unprecedented amounts of digital health information. While EHRs offer many advantages for patients and providers, they also generate risks that must be managed effectively. A new survey of more than 500 healthcare executives...
Mobile device usage in healthcare facilities has increased dramatically in recent years, with more than two out of five physicians using a smartphone or tablet during patient consultations. The potential benefits of these devices are compelling, but mobile device usage also brings risks that must be carefully managed...
If your organization is planning to adopt Meaningful Use to gain Medicare and Medicaid EHR incentive payouts, avoid penalties, or build a stronger security position, you probably have questions about how to meet the measure.
This white paper helps you understand what Meaningful Use means to your organization, and...
The privacy profession is evolving, says Kirk Herath, Chief Privacy Officer of Nationwide Insurance. For those who are new to the role, Herath offers three pieces of advice.
Commerce Undersecretary for Standards and Technology Patrick Gallagher sees the private sector, not government, taking the lead to develop tools, processes and standards to help safeguard IT systems and data in and out of government.
Imperva would neither confirm nor deny it helped defend the Vatican website from a hacktivist assault last year, but the IT security provider's director of security, Rob Rachwald, explains how such an attack was constructed and defended.
Most breaches have a link to an insider, but security leaders continually fail to recognize the signs. Why do organizations miss the obvious risks, and what can they do to improve their tactics?
White House Cybersecurity Coordinator Howard Schmidt, in an exclusive interview, expresses optimism that Congress could enact significant cybersecurity legislation this year even if President Obama doesn't get all that he wants in an IT security bill.
The number of hospitals using health information technology has more than doubled over the past two years. While electronic health records undoubtedly promise greater efficiency and improved patient care, they also introduce new potential risks into the system. Ensuring the confidentiality, integrity, and availability...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.