How does the role of IT security professionals need to change to improve the security of their organizations? Steve Durbin of the Information Security Forum offers insights.
Challenged by sophisticated threats and the complexity and cost of security, global leaders wonder: "Is my organization going to be the next breach headline?" IBM's Latha Maripuri discusses global trends.
An analysis of many recent studies suggests that over 80 percent of applications contain simple vulnerabilities. Here are five tips that developers can leverage to secure their code.
As we close out one year and begin another, we look back at IT security lessons that emerged over the past 12 months. Here are five that should resonate in the coming year.
There are new dynamics shaping privacy and the privacy profession today, and ultimately there are new skills demanded from professionals to successfully embrace the future.
A new report from the Government Accountability Office serves as a reminder that the physical cannot be safeguarded effectively without help from the virtual.
The United States has a long way to go in leveraging information technology to minimize the health impacts of natural disasters, disease outbreaks, terrorist attacks and other incidents.
Following President Obama's signing of healthcare reform legislation March 23, tens of millions of uninsured Americans could gain coverage in the next few years. That will create new responsibility to keep their insurance information, as well as their patient records, private and secure. Think of the millions of new...
The Annual HIMSS Leadership Survey is far from scientific. But the results are nevertheless eye-opening. This year's results show that 23% of responding organizations have had some sort of a security breach in the past year. And that's a big number.
Every year, the Healthcare Information and Management Systems Society's conference offers a crash course on all aspects of applying information technology in healthcare. This year's show, to be held Feb. 28-March 4 in Atlanta, will offer more content than ever on privacy, security, compliance and risk management...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.