Farzad Mostashari, M.D., the national coordinator for health information technology, sees the exchange of health information as a way to improve care quality. But what's his vision for achieving truly secure data exchange?
We talk increasingly about what we have in common - global risks, threats and growing an effective security workforce. But what are the unique characteristics of individual marketplaces? That's a question I hope to answer this week in London.
The hunt for a Boston Marathon bombing suspect that locked down the city caused massive disruption to business operations, but enterprises that had business continuity plans in place hardly missed a beat.
Ignoring a White House threat to veto the Cyber Intelligence Sharing and Protection Act, the House of Representatives overwhelmingly approved the bill known as CISPA, sending the measure to the Senate.
To retain their customers after a breach of sensitive information, organizations should take the extra step of calling those affected to offer free credit protection services, says security expert Brian Dean.
To meet Obama administration concerns, the House sponsors of the Cyber Intelligence Sharing and Protection Act amended the bill. But a White House spokesman says those changes didn't go far enough to protect citizens' privacy and civil liberties.
Expanding the use of encryption is a top breach prevention step for 2013, the Healthcare Information Security Today survey confirms. And CISO Eric Cowperthwaite says a risk assessment is essential for setting encryption priorities.
The rush to find qualified IT security professionals to meet current cyberthreats could jeopardize IT systems' security in the not-too-distant future, say two leading IT security experts, Eugene Spafford and Ron Ross.