The fall flu season has begun in the U.S., and the news each day is filled with stories about H1N1 (swine flu) outbreaks at schools and businesses. But how bad is the outbreak? Is it on a par with a typical flu season? Far better or far worse?
For the fourth time in a year, the Federal Trade Commission (FTC) has extended the enforcement deadline for state-chartered credit unions and non-banking entities covered by the Identity Theft Red Flags Rule.
We all can see the technological and market forces converging to necessitate and enable electronic healthcare records.
But how does this transition impact privacy and compliance within an organization? What are the ramifications for IT and security departments?
Kim Singletary, Solutions Marketing for McAfee,...
Allan Bachman has fought fraud since the early 1970s, and he's seen the crimes evolve in both sophistication and scale.
In an exclusive interview, Bachman, Education Manager for the Association of Certified Fraud Examiners (ACFE), discusses:
The evolution of fraud schemes;
The most common types of fraud seen...
Malware, Consumer Technology, Social Networks Head the List of Vulnerabilities
Know what scares security expert John Pescatore the most? The image of a remote employee sitting at a home office or public setting, plugging into an unsecured network, accessing critical business data via a personal laptop or...
Increased demand during a severe pandemic could exceed the capacities of Internet providers' access networks for residential users and interfere with teleworkers in the securities market and other sectors, the Government Accountability Office says.
We all can see the technological and market forces converging to necessitate and enable electronic healthcare records.
But how does this transition impact privacy and compliance within an organization? What are the ramifications for IT and security departments?
Kim Singletary, Solutions Marketing for McAfee,...
The fall flu season has begun in the U.S., and the news each day is filled with stories about H1N1 (swine flu) outbreaks at schools and businesses. But how bad is the outbreak? Is it on a par with a typical flu season? Far better or far worse?
To help separate fact from fiction, noted pandemic expert Regina Phelps...
Army Biometrics Taskforce Director Myra Gray sees biometrics as the best identifier of individuals but shouldn't be employed alone as means to shield people's identities from those who would cause harm.
Information assurance is a topic atop many agendas these days, starting with the president's own cybersecurity initiative. But what is the state of information assurance education?
Dr. Eugene Spafford of Purdue University is one of the icons of security education, and in this exclusive interview he...
The same biometric tool to identify a friend or foe in combat can be repurposed back in the states to help secure military installations, says Biometrics Task Force Assistant Director Lisa Smith.
It's one of the newest and most popular stops on the Washington, D.C. tour, and its artifacts of history leave clues for how information security professionals should approach their future.
The International Spy Museum has just celebrated its 7th year and its 5 millionth visitor, says Executive Director Peter...
Interview with Cliff Baker of HITRUST Alliance
For too many healthcare organizations, information security is about regulatory compliance - requirements and checklists.
It's time for patients, privacy and true information security to be prioritized, says Cliff Baker, Chief Strategy Officer with the HITRUST...
Social networking. Cyberbullying. Identity theft.
There are myriad threats to children as they explore their online universe. And to counter these threats is Safe and Secure Online, a new interactive presentation that brings information security professionals into classrooms to give sound advice to 11-14-year-old...
Visa has announced new global best practices for data field encryption, also known as end-to-end encryption - a much-discussed solution in the wake of the Heartland Payment Systems breach.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.