It's an increasingly common question from CEOs. "How is our security program protecting the business?" Pamela Gupta of OutSecure shares insight on what CISOs should demonstrate when they answer that question.
Improper disposal of protected health information poses significant risks, as recent breach incidents demonstrate. That's why organizations need to do a better job vetting disposal companies and verifying that data or devices are actually destroyed.
What do TV's The Big Bang Theory, the computer game Call of Duty and traveling have in common? They're the top leisure pursuits enjoyed by IT security professionals. But what are other common attributes?
The Obama administration is floating the idea that critical infrastructure owners would more likely adopt voluntary security best practices if the government engages the insurance industry to help develop its cybersecurity framework.
Federal advisers want to stress the value of risk assessments even more strongly in Stage 3 of the HITECH Act electronic health record incentive program. Meanwhile, regulators are studying how to address health information exchange security issues.
Farzad Mostashari's successor as leader of the Office of the National Coordinator for Health IT will have plenty of privacy and security issues to tackle, industry observers say. Find out what they say is on the to-do list.
Phyllis Schneck, the next deputy undersecretary for cybersecurity at the Department of Homeland Security, comes to the job with a different set of experiences than her predecessors - and that could prove valuable.
DDoS attacks launched by hacktivists are often viewed as little more than an interruption to online services. But Terry Ray of Imperva highlights a greater worry hidden behind these attacks.
The Centers for Medicare and Medicaid Services is cutting it close with deadlines to address the security risks of a project vital to new state health insurance exchanges slated to begin operations Oct. 1, a new report concludes.
Farzad Mostashari, M.D., who has championed programs of the HITECH Act over the last two years as national coordinator for health IT, announced Aug. 6 that he will be leaving his post in the fall.
The best ideas to secure the Internet do not come from the top-down government approach imposed by some foreign governments, but from the openness derived by a multi-stakeholder process, says Christopher Painter, America's top cyber diplomat.
Having a CISO within an organization can help in holding down data breach costs, says the Ponemon Institute's Larry Ponemon, who, along with Symantec's Robert Hamilton, analyzes new survey results.
Who is Izz ad-Din al-Qassam? In this analysis, Information Security Media Group weighs the evidence about whether this is an independent hacktivist group or a front for a nation-state or a crime ring.
New York's statewide health information exchange is leading a groundbreaking effort to enable patients to securely access their own records from different clinicians via one portal. HIE leader David Whitlinger shares the security details.
As IPv6, the new Internet protocol, moves closer to implementation, security options will be enhanced, says EMC researcher Davi Ottenheimer. But what about the new challenges? Here, he reviews what to expect.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.