House Cybersecurity Caucus Co-Chair Jim Langevin sees the new International Telecommunication Regulations, approved in Dubai earlier this month over the objections of the U.S., as a veiled threat to suffocate Internet freedom around the world.
The Government Accountability Office is preparing a comprehensive analysis of the nation's cybersecurity strategy to determine its effectiveness in securing government IT and critical information infrastructures.
In recent weeks, the federal tally of major health information breaches has been growing at a relatively slow pace. Is that evidence that healthcare organizations are getting better at preventing breaches?
Threats have evolved, and so have our Internet needs. This is why organizations need to explore the security and productivity gains of the next-generation firewall, says Patrick Sweeney of Dell SonicWALL.
A federal advisory panel will urge the Office of the National Coordinator for Health IT to provide physicians and hospitals with best practices for verifying the IDs of patients using web portals to access records.
"While these two priorities - sharing and safeguarding - are often seen as mutually exclusive, in reality they are mutually reinforcing," President Obama says in the introduction to the strategy.
When it comes to mobile security, users say the right things, but still indulge in risky behavior. Javelin's Al Pascual tells how security leaders can create better partnerships and practices in 2013.
The line between national security and civilian systems is a blurry one, says Franklin Reeder, a former OMB executive, who co-authored a report identifying ways to cross the line to defend both.
A breach that resulted in a $1 million HIPAA settlement led Partners Healthcare in Boston to take many significant steps, including merging its privacy and security efforts, says CISO Jennings Aske. More changes are planned for 2013.
The increase since 2006 in the number of IT security terms found in a new NIST glossary shows the importance of information security in the way we conduct business today.
A new training and testing program is being developed for a credential certifying expertise in healthcare information security. Learn why ISC2 and HITRUST are working together on the project.
The Walgreens drugstore chain will pay $16.6 million to settle a California case involving improper disposal of hazardous waste, as well as certain confidential patient information, in dumpsters near their stores.
In parts of Europe and Asia, privacy legislation took solid steps forward in 2012. In the U.S., however, progress has stalled. Is the U.S. at risk of falling behind when it comes to privacy protection?
A new Congress - the 113th - comes to Washington in January, and the battles over IT security begin anew. Here's my take on how cybersecurity will take shape in 2013.
Healthcare organizations need to more closely monitor how their business associates protect the security of patient information and step up risk assessments as they prepare to comply with looming HIPAA modifications, says attorney Lisa Sotto.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.