Farzad Mostashari, who heads the Office of the National Coordinator for Health IT, told a House panel that the HITECH incentive program is on track to achieve its goals of widespread adoption of EHRs and secure data interchange.
NIST issues its interagency report on supply chain practices as a congressional panel cautions against using Chinese-made components that some lawmakers fear might have been altered to spy on Western governments and businesses.
Despite numerous data breaches, as well as financial incentives and penalties, many healthcare organizations aren't taking risk assessment requirements seriously. Experts offer insights on best practices.
Post-Superstorm Sandy, as security pros prepare for disasters, they must consider the integrity and availability of data - an often overlooked business continuity element, says Alan Berman of DRI.
President Obama has signed a classified presidential directive that reportedly enables the military to act more aggressively to frustrate cyberattacks on government and private computer networks.
For the second time in three months, the Senate on Nov. 14 failed to muster the 60 votes needed to halt a filibuster of the Cybersecurity Act of 2012. The vote was 51-47.
An important lesson in the aftermath of Superstorm Sandy is the need to beef up contingency plans, including making sure staff members are cross-trained, says Deborah Kobza, CEO of the National Health Information Sharing and Analysis Center.
Incorporating new concepts such as security-control overlays and placing a renewed emphasis on information assurance, the forthcoming guidance is 'a total rewrite' from the 2009 version, NIST's Ron Ross says.
The Department of Homeland Security is testing whether data from social media sites can help identify public health issues, such as infectious disease outbreaks and bioterrorism. Learn about the strategy.
The kind of detailed data analysis that helped statistician Nate Silver predict accurately the outcome of the U.S. presidential election could help enterprises using cloud-based SIEM to identify vulnerabilities, says Cloud Security Alliance's Jens Laundrup.
To know how best to respond to IT and communications failures, incident response pros first must collect information on such incidents, says Marnix Dekker, who co-authored a new report for ENISA.
Federal advisers are seeking insights on the best methods for verifying the identity of patients seeking online access to their records. What are the key issues? And how can you share your views?
The FDA's proposed Unique Device Identification System could help the agency and healthcare providers more easily identify medical device safety issues, including malware threats, says agency official Jay Crowley.
Updated risk assessment guidance from NIST provides helpful insights that healthcare organizations can apply, says security consultant Kate Borten. Learn more about how to leverage the guidance.
Acquiring IT security products gets more complicated every day, so SINET's John Muir says it's not unreasonable to expect that even the most informed CISO needs help in identifying the right hardware, software and services to obtain.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.