Dmitri Alperovitch, McAfee Labs threat research vice president, discusses the company's annual threat predictions, saying: "We are seeing an escalating threat landscape in 2011."
"The environment that started by supporting whistleblowers ... is essentially morphing into 'Gee, we as an organization need to be completely transparent, whether we want to or not,'" says Cal Slemp, managing director of Protiviti.
Thwarting the insider threat entails more than knowing an individual with access to a computer, but to recognize the synergy between the individual, organization, technology and environment, I3P Research Director Shari Lawrence Pfleeger says.
"Literally, in my entire time working in the privacy field, I've never seen such profound and aggressive activity by the government in the privacy space," privacy expert Thomas Oscherwitz says.
Ron Kloewer, CIO at 25-bed Montgomery County Memorial Hospital, explains why the critical access facility's spending on information security will grow in 2011.
Devising strategies for ensuring social media are not used in ways that violate patient privacy is one of the top trends for 2011, says Lisa Gallagher, senior director of privacy and security at the Healthcare Information and Management Systems Society.
This week's top news and views: Revised NHIN Governance Plan Advances; Sizing Up the Role of XML in EHRs; Top Healthcare Security Trends for 2011. And don't miss our audio week-in-review podcast by Howard Anderson, managing editor.
Expanding use of secure messaging as well as remote access to information systems are key 2011 IT priorities for Shriners Hospitals for Children, says Bill Bria, M.D., chief medical information officer.
With a hodgepodge of networks, applications and operating systems to manage - maintaining security and preventing breaches can be difficult. The challenges are daunting, but solutions are at hand.
This is the perspective of Roark Pollock of HP Tippingpoint. In an interview, Pollock discusses three specific...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.