Cisco has announced a major update to Cisco CCNA and CCNP security certifications to deliver specialized training in IT security to meet the needs of emerging technologies.
Federal authorities on Feb. 24 released a proposed rule setting certification standards for electronic health record software for Stage 2 of the HITECH Act EHR incentive program. Learn what it says about encryption.
Challenged by sophisticated threats and the complexity and cost of security, global leaders wonder: "Is my organization going to be the next breach headline?" IBM's Latha Maripuri discusses global trends.
Organizations want the efficiencies of cloud computing. But they still worry about availability and security of data in the cloud. CSC's Andy Purdy offers insight into easing cloud security concerns.
This year's HIPAA compliance audit program will come up somewhat short of the target of 150 audits, says Leon Rodriguez, the nation's lead HIPAA enforcer.
Not all hackers are the same, and that presents problems in defending against them. Understanding each type of hacker can help organizations better prepare for digital assaults.
Federal officials have unveiled one of two proposed rules for Stage 2 of the HITECH Act electronic health record incentive program. Find out what the proposal has to say about privacy and security.
Federal authorities on Feb. 24 released a proposed rule setting certification standards for electronic health record software for Stage 2 of the HITECH Act EHR incentive program.
The Obama administration's Consumer Privacy Bill of Rights should be seen as a vital document to help shape an expansive and globally accepted privacy framework in the United States, privacy and data security lawyer Lisa Sotto says.
Proposed rules for Stage 2 of the HITECH Act electronic health record incentive program, to be unveiled today, will contain a substantial list of new privacy and security requirements, federal officials confirm.
This is the first RSA Conference since 2011's high-profile security breaches. How did those incidents influence this year's agenda? Hugh Thompson explains in an exclusive event preview.
Clever motivational techniques can play an important role in making sure patient privacy is protected and in creating a corporate culture that values security.
To protect privacy without adversely affecting the quality of healthcare, hospitals and clinics need to monitor records access and use access controls, a medical informatics expert at Kaiser Permanente says.
Healthcare organizations need to make sure they don't overlook certain key risk management and security steps. Learn from industry experts exactly what those key measures are.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.