With different nations establishing different privacy standards, organizations face adopting the most stringent regulations in order to be compliant everywhere they operate, says Marc Groman, a director of the International Association of Privacy Professionals.
In this week's breach roundup, read about the latest incidents, including two healthcare breaches involving stolen laptops and another incident affecting Medicaid recipients in Kentucky.
Cloud computing and mobility are areas likely to see new regulatory attention in the year ahead. But what are the other hot topics that leading attorneys believe will be addressed in new legislation worldwide?
What are the top account takeover threats to banking institutions in 2013? Ken Baylor of NSS Labs discusses Zeus variants, mobile malware and how institutions can protect themselves from fraudsters.
To acknowledge leaders who are playing a critical role in shaping the way healthcare organizations approach information security and privacy, HealthcareInfoSecurity announces its inaugural list of Influencers.
With HIPAA compliance audits slated to resume within about a year, what steps can healthcare organizations take to begin to prepare? OCR's Leon Rodriguez offers strategies based on initial audit findings and breach investigations.
For the first time, a federal investigation of a health information breach that affected fewer than 500 individuals has resulted in a financial penalty for HIPAA violations. Read more about the settlement.
An evolving concept known as "intelligent security" involves using a combination of technologies to detect threats, helping security professionals become more proactive. Learn how pioneers are using the new approach.
How will mobility, evolving threats and legislative trends impact privacy and security professionals in 2013? Intel CISO Malcolm Harkins and McAfee CPO Michelle Dennedy offer their predictions.
Members of the U.S. Congress may be more sensitive to cyberthreats than they were in the past, but that doesn't mean they truly all appreciate the risk key government and private-sector IT systems face, says House Cybersecurity Caucus Co-Chair Jim Langevin.
A long-overdue omnibus package that includes HIPAA modifications tops the list of regulations dealing with health data privacy and security issues that are pending for 2013. Find out what else is on the horizon.
Threats have evolved, and so have our Internet needs. This is why organizations need to explore the security and productivity gains of the next-generation firewall, says Patrick Sweeney of Dell SonicWALL.
An international telecommunications treaty, approved in Dubai in early December, is a veiled threat to suffocate Internet freedom internationally, says Rep. Jim Langevin, the Rhode Island Democrat who co-chairs the House Cybersecurity Caucus.
From Global Payments to LinkedIn and Zappos, 2012 was filled with notable data breaches. What were the most significant breaches, and how should they influence organizations' breach responses in 2013?
Federal regulators will issue a series of voluntary guidelines on health information exchange to address privacy, security and other issues. Find out what observers are saying about this new approach.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.