Information security professionals with ID and access management skills are in high demand because the growth in cloud computing and mobile technologies is creating new potential vulnerabilities.
Army Gen. Keith Alexander, the head of the U.S. military's Cyber Command and National Security Agency, paints a bleak picture with mounting challenges to the Defense Department's and nation's IT systems at a House hearing.
Far too many identity solutions today rely on simple user names and passwords, says Brent Williams, CTO of Anakam Identity Services - the identity product line of Equifax. But the future of identity is bright, he says.
Radiant Logic, SonicWALL and M86 were among the organizations to issue product/solution news releases at RSA Conference 2012. See the latest announcements from the show.
From smart phones to tablets, laptops to USB devices, consumer technologies are ubiquitous in the workplace - and so is the 'bring-your-own-device' (BYOD) practice of allowing employees to conduct work on their own personal electronics.
But how do these consumer technologies change organizations' approaches to...
When it comes to employee-owned mobile devices, many organizations want to run away from the security risks of the bring-your-own-device-to-work trend. Intel chose to run toward them.
In an exclusive case study, Intel CISO Malcolm Harkins details the security challenges and business opportunities of BYOD. And he...
As part of the updated FFIEC Authentication Guidance, U.S. banking regulators mandate that financial institutions conduct periodic risk assessments of their electronic banking services.
But in the face of evolving threats, a growing online customer base and emerging mobile technology, what is the most effective...
Breach prevention and regulatory compliance are driving healthcare information security technology investments for the year ahead. Read more about the Top 5 technology investments for 2012.
By using federated digital credentials, the federal government has taken a significant step toward creating more efficiency to better serve the needs of the American people in the 21st century, Cybersecurity Coordinator Howard Schmidt says.
Russ Jones of Albert Einstein Healthcare Network describes why the delivery system shifted from magnetic stripe cards to smart cards for a variety of applications.
The Internet is inherently insecure, and the only way to ensure today's evolving information systems is to build them upon three pillars of trust. This is the premise of Mike Ozburn, Principal at Booz Allen Hamilton, which has just authored a new white paper about these pillars.
Russ Jones of Albert Einstein Healthcare Network describes why the delivery system shifted from magnetic stripe cards to smart cards for a variety of applications.
Community hospitals must become more vigilant about information security, especially as they apply for HITECH Act electronic health records incentive payments, says Chuck Christian, CIO at Good Samaritan Hospital in Vincennes, Ind.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.