Cybersecurity reform was part of a defense bill that included a provision to repeal a law that bar gays from serving openly in the military. Supporters couldn't muster the support to bring a Senate vote on the bill.
Information security incidents are more sophisticated - and so are the criminals who perpetrate them. This raises the bar for professionals seeking careers in incident response in 2011.
One of the many difficult challenges involved in devising federal regulations governing the privacy and security of personal health records is that so many different flavors of PHRs exist.
How can you recognize the intent of your colleague and perhaps prevent him from manifesting as a true insider threat? Blogger Upasana Gupta provides the answer.
Figuring out a way to make sure health information exchanges play by the same rules when sharing data nationally is proving to be a very difficult task.
An (ISC)2 survey suggests that a Commission on Cybersecurity for the 44th Presidency paper backs a government-run board to oversee IT security certifications, a point disputed by the report's author. Where does the truth lie?
The news that Health Net has now been fined twice in connection with a health information breach incident is a wakeup call for breach prevention action.
Hospitals and clinics that have yet to conduct a risk assessment or create a substantial information security budget should consider the high cost of breaches.
The possibility grows that hackers could take away control of the car from drivers as more automakers provide vehicle-to-vehicle and vehicle-to-infrastructure communications networks to third-party development.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.