Expectations clashed with reality during Howard Schmidt's 28-month tenure as the White House's first cybersecurity coordinator, a job he is slated to leave in mid-June.
A U.S. appellate court decision in a case involving a jail term for a HIPAA violator offers an important reminder of the potential consequences for accessing patient records without a valid reason.
Factors driving up the index vary from month to monthly, but the clear takeaway of the survey of IT security practitioners is that they're getting more apprehensive about safeguarding IT.
Application security is driving demand for highly skilled consultants. It's a challenging profession, and I've broken out five key skills that will distinguish you in the field.
Symantec says Internet vulnerabilities are down, but don't get too comfortable. We can expect more attacks in 2012. Why are the same threats still posing so much concern?
Partisan bickering surrounding a bill aimed at protecting the nation's critical IT infrastructure is the likely reason the measure will not come up for a vote in the lower chamber this week, as representatives debate four other cybersecurity bills.
Rep. Dan Lungren introduced an amendment to his onetime bipartisan cybersecurity bill that won only the backing of fellow Republicans with Democratic members of the House Homeland Security Committee objecting to the changes.
One problem tracking IT security employment is the dearth of information. Even the most trustworthy organization in collecting employment data, the Bureau of Labor Statistics, furnishes infosec data it cautions aren't reliable.
Should you accept a Facebook friend request from your boss? And if you don't accept the invitation, could that decision possibly hurt your career? I asked our advisers, who offer thoughtful insights.
"If they can do it against RSA, that makes most of the other companies vulnerable," says Army Gen. Keith Alexander, the military's Cyber Command commander and National Security Agency director.
New government guidance on privacy and security for federally funded health information exchanges is an important interim step until a formal regulation is implemented.
The White House Office of Management and Budget, in its yearly Federal Information Security Management Act report to Congress, gives departments and agencies mixed grades in their efforts to secure federal IT for fiscal year 2011.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.