Getting inspectors general and agencies' IT security heads to agree on how best to evaluate information security should strengthen U.S. federal government agencies' risk management frameworks, say former OMB leaders Karen Evans and Franklin Reeder.
The health advocacy group Genetic Alliance on April 5 will unveil a registry designed to enable patients to control how health information is shared with researchers. Spokesman Greg Biggers discusses privacy measures.
Computer networks in nations where the government has ratified international cyber-agreements have lower incidents of malware infection, says Paul Nicholas, Microsoft senior director of global security strategy and diplomacy.
The new Aurora Research Institute is taking multiple steps to protect the privacy of patients who participate in medical research, clinical trials and personalized medicine endeavors, says institute leader Randall Lambrecht.
The bad guys who attack information systems are getting better at what they do, making old threats even more dangerous, says Steve Durbin of the Information Security Forum.
Want to know how predictive analysis could work to defend your IT systems? Take a look at how American Navy SEALS found Osama bin Laden, says Booz Allen Hamilton's Christopher Ling.
What can organizations do to improve security after a network attack? Post-breach investigations help security leaders trace steps and strengthen weak points, says investigator Erin Nealy Cox.
What's the cost to an organization when it suffers a seurity breach and breaks trust with its own customers? Jeff Hudson, CEO of Venafi, presents results of a new survey on the cost of failed trust.
Venafi has just partnered with Ponemon Group to release a new survey, "The Cost of Failed Trust". Among the key...
The motive behind the cyber-attack on South Korean banks and broadcasters was atypical, as compared to most digital assaults that involve implanting malware on IT systems, says McAfee's Vincent Weafer.
How can healthcare providers help to ensure better medical device security? They need to put more pressure on device vendors at the time of procurement, says security researcher Kevin Fu.
The Medical Device Innovation, Safety and Security Consortium is developing a tool to help providers select medical devices based, in part, on their security attributes, says Dale Nordenberg, M.D., executive director.
CIOs need to go beyond a short-term focus on securing individual systems and take a broader, long-term view on privacy and security issues, says Harry Greenspun, M.D., of the Deloitte Center for Health Solutions.
Solutionary is out with its 2013 Global Threat Intelligence Report. What are the top four threats to organizations, and how can they be mitigated? Security strategist Don Gray offers insights and tips.
Healthcare organizations should use a four-step process to determine how best to apply encryption to minimize security risks, says security expert Feisal Nanji.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.