In October, the Department of Veterans Affairs will launch a go-slow approach to enabling physicians and others to use Apple iPhones and iPads for limited purposes.
Discussing Verizon's new report on the state of PCI compliance, PCI expert Jen Mack says payment card security today is "disappointing," and global merchants are at serious risk of new data breaches.
In the areas of risk management and business continuity, security professionals have advanced significantly since Sept. 11, 2001. But there's still an issue of complacency that needs to be addressed, says Rolf von Roessing, past international vice president of ISACA.
Hacks are unavoidable; they happen. The challenge is how to handle them once they occur. DigiNotar demonstrates what organizations should not do when a breach is discovered.
Only one of three national breach notification bills that won approval in the Senate Judiciary Committee last week would address a gap in protections for healthcare information, says Harley Geiger of the Center for Democracy & Technology.
"Forensics in the cloud is not necessarily a new field, but requires a new skill set and being able to learn on the fly," says Rob Lee, curriculum lead for digital forensics at SANS Institute.
Former CIA lawyer and senior congressional staffer Suzanne Spaulding will assume the Federal Protective Service, Infrastructure Protection, Risk Management and U.S.-Visit portfolios. Current Acting Deputy Undersecretary Greg Schaffer will oversee cybersecurity.
Federal authorities deserve credit for adding privacy and security details to the final version of the Federal Health IT Strategic Plan, several observers say. But some still believe the document doesn't go far enough in spelling out specific action steps and priorities.
Information security poses a major challenge to the widespread adoption of cloud computing, yet the Cloud Security Alliance, an association of cloud stakeholders, sees the cloud as a provider of information security services.
A look at the health information breach statistics and the lessons learned - including the value of encryption - two years after the HITECH Act breach notification rule took effect.
Disaster preparedness has come a long way since the 9/11 terrorist attacks, but most organizations are still missing the mark, says Kevin Sullivan, former investigator with the New York State Police.
Mobile apps and smartphone security are increasing global concerns. But Dr. Giles Hogben of ENISA says mobile malware mania is a bit overhyped, since mobile is actually more secure than most other platforms currently on the market.
Healthcare organizations need to take five key steps to prepare for the upcoming HIPAA compliance audit program, says compliance specialist Bob Chaput.
News about recent healthcare information breaches offers an important reminder: Monitoring the privacy and security procedures of your business associates should be a vital component of any breach prevention strategy.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.