White House Cybersecurity Coordinator Howard Schmidt, in an exclusive interview, expresses optimism that Congress could enact significant cybersecurity legislation this year even if President Obama doesn't get all that he wants in an IT security bill.
A network of cancer hospitals that has relied heavily on laptop computers for clinicians accessing electronic health records is phasing in iPads and iPhones. Learn what steps it's taking to mitigate the security risks involved.
Federal regulators will host a "national provider call" on Monday, March 12, to provide an overview of the proposed Stage 2 "meaningful use" rule for the HITECH Act electronic health record incentive program.
WLANs often have weaker configurations and authentication processes that make them vulnerable for attackers to penetrate and gain access to sensitive information. New guidance from NIST is aimed at helping organizations meet security challenges.
"It was purely my networking that saved us and gave us time to defend ourselves appropriately," says Abbas Kudrati of the National Bank of Kuwait, following a recent cyber incident that impacted the bank.
As part of its ongoing effort to identify privacy and security best practices for the use of mobile devices in healthcare, the Office of the National Coordinator for Health IT is soliciting comments on the issue through March 30.
Organizations are not taking the advanced persistent threat seriously enough, says Hord Tipton of (ISC)2. But security professionals also are not mitigating the common threats, he says. Watch the video.
Consumer advocate Deven McGraw describes what she likes and doesn't like about the privacy and security provisions in the proposed rules for Stage 2 of the HITECH Act electronic health record incentive program.
"People appreciate being contacted when particular transactions look risky," says Peter Tapling, President and CEO of Authentify. "Out-of-band authentication provides the opportunity to do that in real-time, at very low cost to the institutions."
Far too many identity solutions today rely on simple user names and passwords, says Brent Williams, CTO of Anakam Identity Services - the identity product line of Equifax. But the future of identity is bright, he says.
Because winning the support of CEOs for any new project requires demonstrating a return on investment, information security professionals need to more precisely quantify the potential payoff of their suggested spending on technologies and training, according to a new report.