Researchers explore adapting geolocation technology to identify where data reside on the cloud so organizations can comply with IT security laws and regulations, RSA Chief Technology Officer Bret Hartman says.
"The environment that started by supporting whistleblowers ... is essentially morphing into 'Gee, we as an organization need to be completely transparent, whether we want to or not,'" says Cal Slemp, managing director of Protiviti.
Thwarting the insider threat entails more than knowing an individual with access to a computer, but to recognize the synergy between the individual, organization, technology and environment, I3P Research Director Shari Lawrence Pfleeger says.
This week's top news and views: Revised NHIN Governance Plan Advances; Sizing Up the Role of XML in EHRs; Top Healthcare Security Trends for 2011. And don't miss our audio week-in-review podcast by Howard Anderson, managing editor.
Devising strategies for ensuring social media are not used in ways that violate patient privacy is one of the top trends for 2011, says Lisa Gallagher, senior director of privacy and security at the Healthcare Information and Management Systems Society.
With a hodgepodge of networks, applications and operating systems to manage - maintaining security and preventing breaches can be difficult. The challenges are daunting, but solutions are at hand.
This is the perspective of Roark Pollock of HP Tippingpoint. In an interview, Pollock discusses three specific...