In a speech revealing new limits on the way intelligence agencies collect telephone metadata, President Obama also announced a comprehensive review of how government and business are confronting the challenges inherent in big data.
Don't miss the Jan. 24 deadline for participating in HealthcareInfoSecurity's third annual survey examining the priorities and challenges of security leaders at hospitals, clinics and health plans.
The House of Representatives approved its second bill within a week that contains provisions for bolstering HealthCare.gov security. Passage came the same day as two more Congressional hearings on HealthCare.gov security.
Because of increasing cyber-attacks against government agencies, the inspector general says it's crucial for the State Department to address the continuing weaknesses in its information security program.
Target Corp.'s revelation that personal information about up to 70 million customers was breached in a recent malware attack raises new questions about Target's security practices and risks to consumers.
As patient portals become more common in 2014, healthcare providers will struggle to find a balance between implementing strong authentication practices and providing individuals with easy access to records, says privacy attorney Adam Greene.
Georgia Tech researchers are working on a way to profile devices along the supply chain to identify whether they've been compromised, says Paul Royal, associate director of the Georgia Tech Information Security Center.
Intel is changing the name of its McAfee line of security products to Intel Security. The name change follows the badmouthing of McAfee products by founder John McAfee, who sold his company to Intel in 2011.
Healthcare entities are increasingly turning to the cloud, and regulators are increasingly focused on cloud service providers' security. Time to ensure those business associate agreements are in order, says Symantec's Rick Bryant.
To help reduce reliance on passwords, the FIDO Alliance is developing standard technical specifications for advanced authentication. Michael Barrett and Daniel Almenara of FIDO describe the impact the effort could have in 2014.
Breach detection provider FireEye has acquired incident response and remediation services company Mandiant , forming a formidable company that can provide soup-to-nuts products and services to detect, mitigate and respond to breaches.
Healthcare entities are increasingly turning to the cloud, and regulators are increasingly focused on cloud service providers' security. Time to ensure those business associate agreements are in order, says Symantec's Rick Bryant.
Buried deep within a 308-page report from a presidential panel on ways to tighten federal surveillance and IT security programs are important recommendations on how to mitigate the insider threat at federal agencies.
2014 may well be the "Year of Security," and IT security pros must prepare now for new job demands. ISACA's Robert Stroud offers five New Year's resolutions to help prepare for 2014's security trends.
Many business leaders lack a clear understanding of the value of identity and access management. CISO Christopher Paidhrin offers a scenario for how to make the case for an IAM investment.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.