How organizations view security is about to change, says Hugh Thompson of the security firm RSA. He explains why analytics will turn everything we thought we knew about security on its head.
With promises of ramped up HIPAA enforcement by federal regulators, and changes in the breach notification rule under the HIPAA Omnibus Rule, it's time for organizations to get serious about insider risks.
An inspector general's audit of the Department of Veterans Affairs will highlight security control deficiencies in four key areas. Inconsistent enforcement of programs is a major concern.
Federal advisers are considering options for reinforcing the importance of risk assessments in the rules for Stage 3 of the HITECH Act's incentive program for electronic health records.
Only a cockeyed optimist would expect the outcome of this weekend's summit between President Obama and Chinese President Xi Jinping to be a halt to Chinese cyber-attacks on U.S. computers.
Making broader use of encryption is an important breach prevention strategy. But what's the best way to set encryption priorities? CISO Eric Cowperthwaite explains how a risk assessment plays a vital role.
Since 2010, hackers from abroad have repeatedly breached Department of Veterans Affairs computers containing unencrypted data on some 20 million veterans, according to U.S. Rep. Michael Coffman.
RSA's Art Coviello finds today's cybersecurity strategies to be lacking. Global organizations must rely more on big data and public-private partnerships to defend themselves from advanced threats.
Despite growing awareness of cyberthreats, Americans are not overly concerned about their own cybersecurity, Unisys' Steve Vinsik says in his analysis of his company's latest security index.
News about data breaches is motivating more organizations to take steps to improve their security profiles, says Bill Spooner, CIO of Sharp Healthcare, who analyzes the results of the Healthcare Information Security Today survey.
New York state residents soon will be able to use a health information exchange's portal to securely access all their records, rather than having to gain access from providers one-by-one, explains HIE leader David Whitlinger.
What can U.S. and European organizations learn from Asia-Pac about advanced mobile tech and increasing cyberthreats? That's a question I hope to answer while in Singapore for RSA Conference Asia Pacific 2013.
Malware affecting medical devices is one of the most serious emerging threats in healthcare, says security researcher Kevin Fu. Learn about his mitigation recommendations.
After a tornado destroyed an Oklahoma hospital, clinicians were still able to access patients' data. Find out the roles electronic health records and health information exchange played.
When President Obama comes face to face with China's President Xi Jinping, don't expect the American commander in chief to present an ultimatum over Chinese cybersecurity assaults on critical U.S. IT systems.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.