"We took our understanding of the tools, tradecraft and techniques used by these malicious actors, and converted it into actionable information that ... would lower their risk to the type of attack we saw at RSA," DHS Secretary Janet Napolitano says.
Philip Reitinger, the top cybersecurity official in the Department of Homeland Security, is on a mission to help create a new, secure computing ecosystem on the Internet.
The Defense Department hopes to prevent future WikiLeaks-style breaches by employing public key infrastructure-based controlled access cards, but that solution won't be fully in place until mid-2013, DoD CIO Teresa Takai says.
The Commission on Cybersecurity for the 44th Presidency co-chair praises the president's commitment, but says much more work needs to be done to develop a strategy to combat cyber threats.
The billions of dollars worth of HITECH Act incentives available to hospitals and physicians using electronic health records are serving as a powerful catalyst for information security as well.
Expanding use of secure messaging as well as remote access to information systems are key 2011 IT priorities for Shriners Hospitals for Children, says Bill Bria, M.D., chief medical information officer.
Expanding use of secure messaging as well as remote access to information systems are key 2011 IT priorities for Shriners Hospitals for Children, says Bill Bria, M.D., chief medical information officer.
The conventional wisdom that Congress won't enact significant IT security legislation this year hasn't deterred some Democratic lawmakers, including House Homeland Security Committee Chair Bennie Thompson, from introducing another cybersecurity bill.
Social media provide healthcare organizations with a low-cost way to communicate effectively with consumers. But using this form of communication brings with it many risks.
For example, one California hospital recently fired five employees because they used social media to post personal discussions about patients,...
"Operators of critical infrastructure could opt-in to a government-sponsored security regime," Deputy Secretary William Lynn III says. "Individual users who do not want to enroll could stay in the wild wild West of the unprotected Internet."
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.