Emerging technologies, application vulnerabilities and regulatory compliance force organizations to bridge the development and security silos and find avenues for interdisciplinary cooperation to produce secure software.
Smartphones are ubiquitous in organizations today. But how secure are these devices -- and what are the security and liability vulnerabilities associated with their use?
In today's world, where certain data must be let in so governments and businesses can realize their missions, firewalls must be able to see the content flowing through networks, NIST Computer Scientists Tim Grance and Murugiah Souppaya say.
In case you weren't one of the more than 31,000 who attended this year's Healthcare Information and Management Systems Society Conference in Orlando, here's a rundown of some of the privacy and security news from the show.
Once a CEO understands the value and risks catered through mobile functionality, it is easier to discuss mobile innovations, policy and how the company can then strike a balance to meet customer and employee requirements.
The information security profession is at a crucial turning point as professionals scramble to develop new skills in the arenas of cloud computing, mobile applications and social media, a new survey shows.
Hussein Syed, director of IT security at Saint Barnabas Healthcare System, explains why the organization shifted from software-based to hardware-based encryption.
As David Blumenthal, M.D., prepares to step down as National Coordinator for Health Information Technology, it's a good time to assess the privacy and security issues that his successor must address.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.