The US Cyber Challenge is looking for 10,000 young Americans with the skills to fill the ranks of cybersecurity practitioners, researchers and warriors.
Think twice the next time a contact tries to "friend" you on Facebook or "follows" you on Twitter. It may turn out to be an undercover fed looking to scrutinize your employment history or examine your personal references.
Reacting to requests from members of Congress, the Federal Trade Commission has yet again delayed enforcement of its Red Flags Rule until Dec. 31, 2010.
The theft of an unencrypted laptop from an employee's car resulted in a breach affecting more than 61,000 patients at Cincinnati Children's Hospital Medical Center.
Building an effective security team boils down to two critical factors: the security leader who understands the mission and has the ability to find and manage the right people with the right skills to execute.
The U.S. Department of Veterans Affairs is defending its security policies following a recent contentious Congressional hearing at which the department was called to task for security lapses.
"Operators of critical infrastructure could opt-in to a government-sponsored security regime," Deputy Secretary William Lynn III says. "Individual users who do not want to enroll could stay in the wild wild West of the unprotected Internet."
Two U.S. Senators have introduced legislation to exempt smaller healthcare, accounting and legal practices from the Federal Trade Commission's Red Flags Rule.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.