The Privacy and Security Tiger Team, which advises federal regulators, is tackling the issues involved in the exchange of patient information among healthcare providers using the query and response method.
The Department of Health and Human Services conducts three types of audits or investigations involving privacy and security issues. But preparing for any of these inquiries requires similar steps, experts say.
Cyber Command Commander Gen. Keith Alexander tells a Senate panel that it's vital that Congress enact legislation giving the nation's critical infrastructure owners liability protection so they can share cyberthreat information with the government.
Mobility and privacy: Increasingly, organizations are forced to take actions on these topics. What are the latest legal and regulatory trends? Attorneys David Navetta and Ronald Raether share insights.
How are business associates affected by the HIPAA Omnibus Rule? Susan McAndrew of the HHS Office for Civil Rights outlines the relevant provisions and offers compliance advice to covered entities and their partners.
As distributed-denial-of-service attacks on banks continue, a U.S. electric utility also reportedly is a DDoS victim. Is this a sign that hacktivists are broadening their targets? Experts offer analysis.
CIOs need to go beyond a short-term focus on securing individual systems and take a broader, long-term view on privacy and security issues, says Harry Greenspun, M.D., of the Deloitte Center for Health Solutions.
Solutionary is out with its 2013 Global Threat Intelligence Report. What are the top four threats to organizations, and how can they be mitigated? Security strategist Don Gray offers insights and tips.
The Obama administration is calling on the Chinese government to take serious steps to halt cyber-intrusions emanating from China that have resulted in the theft of intellectual property from American companies.
DDoS attacks on banks have returned, and the attackers are changing their tactics and expanding their attack toolsets. How must organizations change the way they defend against DDoS? Carlos Morales of Arbor Networks shares strategies.