Cybersecurity reform was part of a defense bill that included a provision to repeal a law that bar gays from serving openly in the military. Supporters couldn't muster the support to bring a Senate vote on the bill.
"Until they personally suffer pain, they don't think it is something that can happen to them," says Eric Cole, an insider threat expert and SANS Institute faculty fellow.
How can you recognize the intent of your colleague and perhaps prevent him from manifesting as a true insider threat? Blogger Upasana Gupta provides the answer.
The recent WikiLeaks release of thousands of sensitive government documents puts security leaders on notice: The breach threat is real, and no organization is immune.
What's embarrassing about the WikiLeaks episode isn't just the precarious position the publication of diplomatic cables put the U.S. in with its allies but the likelihood that one, low-level analyst accessed sensitive data without authorization and then leaked them.
Just as most financial institutions have implemented security measures to protect access to customers' accounts and personal data, it is just a matter of time before healthcare organizations will be required to do the same.
In a welcome move, two federal agencies are joining forces to support the movement toward broadband and wireless-enabled medical devices while protecting consumer safety.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.