As part of its ongoing effort to identify privacy and security best practices for the use of mobile devices in healthcare, the Office of the National Coordinator for Health IT is soliciting comments on the issue through March 30.
Cybersecurity Act sponsors intensify their campaign to enact the legislation that would change the way the government protects critical federal and private-sector IT networks as a group of key Republican senators offers an alternative bill.
In the PATCO Construction fraud case, attorney David Navetta says the court failed to address two key concerns: reasonable security and good faith. What's next in PATCO's ongoing legal battle?
Voltage Security, TODO1 and IBM were among the organizations to issue product/solution news releases at RSA Conference 2012 this week. See the latest announcements from the show.
RSA, PhoneFactor and Rapid7 were among the organizations to issue product/solution news releases at RSA Conference 2012 on Tuesday, Feb. 28. See the latest announcements from the show.
Challenged by sophisticated threats and the complexity and cost of security, global leaders wonder: "Is my organization going to be the next breach headline?" IBM's Latha Maripuri discusses global trends.
Organizations want the efficiencies of cloud computing. But they still worry about availability and security of data in the cloud. CSC's Andy Purdy offers insight into easing cloud security concerns.
No one - not even a security vendor - is immune to cyber attacks. "It's not a question of if or when companies will face an attack, but how they're going to defend against it," says Symantec's Francis deSouza.
This is the first RSA Conference since 2011's high-profile security breaches. How did those incidents influence this year's agenda? Hugh Thompson explains in an exclusive event preview.
Implementing a mobile device management system is critical for ensuring the security of patient information. But what questions should organizations ask mobile device management vendors to ensure they pick the right system?
Mobile security is a new discussion track at RSA Conference, but it's long been a hot topic for CISOs. Entrust's Dave Rockvam discusses BYOD and how organizations are securing personally-owned devices.
A mobile device management system is critical to any effort to accommodate the use of personally owned mobile devices for work purposes, says Bill Spooner, CIO at Sharp Healthcare.
Jason Clark, CSO of Websense, has met recently with 400 CSOs. In a pre-RSA Conference interview, he discusses how security leaders can be more effective when facing mobile security and other challenges.
To kick off a year-long effort to develop best practice guidance, the Department of Health and Human Services will host a roundtable discussion March 16 on safeguarding health information on mobile devices.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.