Many organizations are expanding their application security teams as they accommodate the use of employee-owned devices in the workplace and build their own app stores.
Though not perfect, says House Cybersecurity Co-Chair Jim Langevin, D-R.I., "CISPA represents an important good-faith effort to come together as a necessary first step toward better cybersecurity for our nation."
Partisan bickering surrounding a bill aimed at protecting the nation's critical IT infrastructure is the likely reason the measure will not come up for a vote in the lower chamber this week, as representatives debate four other cybersecurity bills.
Rep. Dan Lungren introduced an amendment to his onetime bipartisan cybersecurity bill that won only the backing of fellow Republicans with Democratic members of the House Homeland Security Committee objecting to the changes.
Rules for Stage 2 of the HITECH Act electronic health record incentive program are a work in progress, so there's still time to comment on the privacy and security provisions.
"If they can do it against RSA, that makes most of the other companies vulnerable," says Army Gen. Keith Alexander, the military's Cyber Command commander and National Security Agency director.
New government guidance on privacy and security for federally funded health information exchanges is an important interim step until a formal regulation is implemented.
The ECRI Institute recently published a report on controlling the risks involved in using social media in healthcare. Read on to discover insights on how to address risks and prevent breaches.
The average per capita cost of a data breach has declined from $214 to $194, according to the new Cost of a Data Breach study. But there are still plenty of causes for concern, says Dr. Larry Ponemon.
As the use of mobile devices explodes and health information exchanges gear up, it's time to consider whether adequate privacy and security measures are in place.
Army Gen. Keith Alexander, the head of the U.S. military's Cyber Command and National Security Agency, paints a bleak picture with mounting challenges to the Defense Department's and nation's IT systems at a House hearing.
The White House Office of Management and Budget, in its yearly Federal Information Security Management Act report to Congress, gives departments and agencies mixed grades in their efforts to secure federal IT for fiscal year 2011.
The news that BlueCross and BlueShield of Tennessee paid a $1.5 million penalty following a massive breach incident could signal the start of a new era of enforcement.
Earlier this month, I had the chance to attend RSA Conference 2012, which always reminds me how fluid our industry is, and how important it is to stay educated and abreast of change.
Jet Propulsion Laboratory IT Chief Technology Officer Tom Soderstrom is showing that a deliberate, methodical approach can lead to effective and secure cloud computing.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.