Although suggestions in a new Federal Trade Commission staff report do not have the force of law, they do provide guidance on how the agency could enforce American federal laws and regulations to protect the privacy of users of smart phones and tablets.
Containerization - it's the latest strategy for securing the critical data accessed by remote workers and mobile devices. How is the concept deployed? David Lingenfelter of Fiberlink offers insight.
Some organizations concerned about the security flaws of third-party applications are building in-house app stores to service mobile device users. Read how the VA and Sanofi US have tackled the challenge.
Privacy and security leaders, including John Houston at University of Pittsburgh Medical Center, are evaluating the changes needed to comply with the HIPAA omnibus final rule. Find out what's on their to-do lists.
A memorandum issued to Senate Commerce Committee Chairman Jay Rockefeller says the chieftains of America's largest corporations support more coordination on IT security between government and business.
In this week's breach roundup, read about a stem cell bank reaching a settlement with the FTC tied to a 2010 breach and an investigation into unauthorized access to an Alabama state computer network.
Throughout 2013, security professionals will continue to face evolving mobile security challenges, says Javelin's Al Pascual, who, in a new report, analyzes the changing mobile threat landscape for the year.
A Montreal computer science student accessed, without authorization, an IT system to check if a software vulnerability he discovered had been remedied. This case raises the question: When, if ever, is such unauthorized action justified?
Using technology to prevent breaches is insufficient. Security leaders also must address the human factor, making sure staff members receive appropriate training on clear-cut policies - before it's too late.
Smaller companies are among the business associates and subcontractors most likely to face the biggest hurdles in sorting through the new compliance requirements of the final HIPAA omnibus rule.
Managing advanced persistent threats will be a priority throughout 2013, says RSA CISO Eddie Schwartz. How should organizations defend themselves against APTs and the year's other top security threats?
"We're going to have to find a way to address the interests of other states to ... find common ground," Secretary of State John Kerry says. "We're just going to have to dig into it a lot deeper. I don't have a magic silver bullet to throw at you here today."
Recent high-profile court cases involving banks and their defrauded commercial customers highlight a growing reliance by judges on regulatory oversight during litigation, says attorney David Navetta.
As enterprises move more applications to the cloud, continuous monitoring will play a greater role in assuring the software is patched in a timely manner, says John Streufert, DHS director of federal network resilience.
Susan McAndrew of the HHS Office for Civil Rights offers a detailed analysis of the final omnibus rule, which extensively modifies HIPAA and provides new guidance about when to report a breach.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.