How does the role of IT security professionals need to change to improve the security of their organizations? Steve Durbin of the Information Security Forum offers insights.
Organizers of health information exchanges must guard against underestimating the amount of time it takes to tackle privacy issues, says IDC's Lynne Dunbrack.
What's the best way to win a CEO's support for greater information security investments? Consultant Eric Mueller advises IT security professionals to spell out the business impact of inadequate security.
According to our new survey, more than half of banking institutions expect an increase in fraud-fighting resources this year. But how are they investing those resources? The answers may surprise you.
Creating a "culture of compliance" that emphasizes the importance of maintaining patient privacy requires far more than "management by committee," says change management specialist Jan Hillier.
One problem tracking IT security employment is the dearth of information. Even the most trustworthy organization in collecting employment data, the Bureau of Labor Statistics, furnishes infosec data it cautions aren't reliable.
With a court decision handed down in Texas, a lingering lawsuit against Heartland Payment Systems and two acquiring banks, KeyBank and Heartland Bank, appears to finally have been put to rest.
CIO Roger Baker concurs with auditor's recommendations, saying the Department of Veterans Affairs has "embarked on a cultural transformation" and that "securing information is everyone's responsibility."
Ignorance is not bliss. Two new studies, when viewed together, show that consumers' ignorance of the consequences of their actions coupled with enterprises' unawareness of their computing environment equal unacceptable risk.
The cost of a data breach is down, say the latest Ponemon Institute study. But as the Global Payments breach shows, organizations still have many reasons to be concerned, says researcher Larry Ponemon.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.