As enterprises move more applications to the cloud, continuous monitoring will play a greater role in assuring the software is patched in a timely manner, says John Streufert, DHS director of federal network resilience.
As the National Institutes of Health ramps up research projects involving human genomes, electronic health records and other sensitive data, it's exploring the best ways to protect that data, says research director Eric Green, M.D., PhD.
Susan McAndrew of the HHS Office for Civil Rights offers a detailed analysis of the final omnibus rule, which extensively modifies HIPAA and provides new guidance about when to report a breach.
The new omnibus rule makes it clear that business associates must comply with HIPAA. And the latest additions to the federal health data breach tally put a spotlight on why some BAs need to improve patient data protection.
In this week's breach roundup, read about the latest incidents, including the fourth major breach affecting Stanford University medical facilities and a vendor misplacing information on 6,000 Utah Medicaid clients.
In 2012, we saw the rise of state-sponsored malware, as well as the evolution of Trojans and ransomware. What new threats will 2013 bring? Adam Kujawa of Malwarebytes offers insights.
The sentencing of a former hospital emergency department worker in a data theft case serves as a reminder of why healthcare organizations need to take steps to prevent improper access to records.
The proposal, in the form of a bill, lays out a framework that can balance the needs and concerns of government and the private sector and keep Americans safe, says Sen. Tom Carper, one of the measure's chief sponsors.
As a growing number of enterprises turn to cloud computing, the government could reclassify the cloud as a critical infrastructure, putting it on par with electrical grids, public-health networks and banking systems. Will regulations follow?
Attendees at the first of two "town hall" online meetings about secure health information exchange said standards are needed to help build trust that patient information will remain private, secure and reliable. Find out more about their top concerns.
The "ban the box" trend will gain momentum for background screening in 2013, says screening expert Les Rosen, who analyzes the movement to remove criminal-conviction questions from job applications.
Sharing information about physical and cyber threats needn't be segregated under the U.S. federal government's National Strategy for Information Sharing and Safeguarding, says Kshemendra Paul, who manages the implementation of the strategy.
It's not malware, crime rings or hacktivists. What, then, are among the threats that concern security leaders most? CISO Tom Newton offers new insight on today's top threats and strategies to combat them.
New guidance on when to notify authorities of a breach is one of the most significant provisions in the HIPAA omnibus final rule, experts say. Find out what other provisions are drawing attention.
ENISA, the European Union cyber-agency, is out with its first-ever Threat Landscape report. What are the emerging threats and vulnerabilities, and how should organizations globally respond to them?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.