Both candidates have made fleeting references to cybersecurity during the presidential campaign, but neither has addressed the matter in detail. How different would a President Romney be from a second-term President Obama?
Cybersecurity thought-leader Ira Winkler has just been named ISSA's new international president. One of his first tasks is overseeing the start of two new special interest groups. What is their mission?
How big of a role did health information exchanges play in providing access to records during Superstorm Sandy, and what lessons can be learned? Federal officials will address these questions, says HIE expert Lee Stevens.
It's difficult to know where sensitive patient information may be lurking in user files. But some healthcare organizations are finding ways to detect where the information resides so they can protect it. Find out how.
In the northeastern U.S., millions of residents are still coping with the devastation caused by Superstorm Sandy. Find out whether business continuity/disaster recovery plans are proving to be effective.
A key aim of the Next Generation Cyber Initiative has been to expand the FBI's ability to quickly define 'the attribution piece' of a cyberattack to help determine an appropriate response, the FBI's Richard McFeely says.
Hurricane Sandy slammed the East Coast Oct. 29, causing widespread damage and power outages. As a result, business continuity plans are being put to the test. How are governments, financial institutions and healthcare organizations responding?
Connecticut is working to improve its cyber incident response, including updating its breach notification law and enacting a privacy task force. Connecticut Attorney General George Jepsen explains why.
"We will bring in best practices for HIPAA and technology best practices in terms of encryption in how we handle data and share it with stakeholders," says Curt Kwak CIO of Wash. State Health Benefit Exchange.
The Department of Veterans Affairs is not taking adequate steps to protect the privacy of sensitive information that's shared with researchers, according to a new OIG report. Find out what the OIG recommends.