Army Gen. Keith Alexander, the head of the U.S. military's Cyber Command and National Security Agency, paints a bleak picture with mounting challenges to the Defense Department's and nation's IT systems at a House hearing.
An Oregon nursing assistant spent eight days in jail for invasion of personal privacy on Facebook. The case provides an eye-opening lesson about the consequences of misusing social media.
Far too many identity solutions today rely on simple user names and passwords, says Brent Williams, CTO of Anakam Identity Services - the identity product line of Equifax. But the future of identity is bright, he says.
Radiant Logic, SonicWALL and M86 were among the organizations to issue product/solution news releases at RSA Conference 2012. See the latest announcements from the show.
Who are the true leaders in the healthcare information privacy and security arena? HealthcareInfoSecurity plans to prepare a list of the Top 10 Influencers, and we need your help.
Bringing Your Own Device raises jitters among employers, who worry about exposing or losing sensitive data, and employees, who fret about their bosses spying on them. Despite these anxieties, the trend will continue because that's what people want.
Breach prevention and regulatory compliance are driving healthcare information security technology investments for the year ahead. Read more about the Top 5 technology investments for 2012.
A wave of security breaches serves as a catalyst for all types of organizations to assess the need for cyber insurance. Here's the story of one institution that saw the threat and took out a $10 million policy.
By using federated digital credentials, the federal government has taken a significant step toward creating more efficiency to better serve the needs of the American people in the 21st century, Cybersecurity Coordinator Howard Schmidt says.
News about recent healthcare information breaches offers an important reminder: Monitoring the privacy and security procedures of your business associates should be a vital component of any breach prevention strategy.
While it's good to see more privacy and security details included in the final version of the Federal Health IT Strategic Plan, much work remains to ensure patient information is protected when it's exchanged.
Because social media pose significant risks to patient privacy, healthcare organizations need to develop detailed social media policies. But unfortunately, many organizations have yet to take that action.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.