Employment of IT security professionals in the United States is at an all-time high, our analysis of the latest U.S. government jobs data shows, but the growth in the profession isn't keeping pace with the demand for these skills in business and government.
Four clinics in New York will test using tablet computers to educate patients before they make a decision on granting their consent for health information exchange. Find out how the program will work.
Delaware state information security officers recently convened for a day of meetings and training to better prepare for incidents in their individual agencies, an event state CSO Elayne Starkey compares to fire drills.
Lost and stolen unencrypted mobile devices are reoccurring culprits in health data breaches. So why isn't the use of encryption more widespread? And how are organizations ramping up mobile security?
"Any bug, beacon or backdoor put into our critical systems could allow for a catastrophic and devastating domino effect of failures throughout our networks," says Mike Rogers, chairman of the House Select Committee on Intelligence.
DDoS attacks have existed for years. But the latest wave brings new threats to organizations. How should they defend against these attacks? Ashley Stephenson of Corero Network Security offers insights.
DDoS attacks have existed for years. But the latest wave brings new threats to organizations. How should they...
The Department of Veterans Affairs' mobile device management system, which will support 100,000 devices, will be cloud-based and will be paired with an apps store.
"Given the gravity of the threats we face in cyberspace, we want to get this right in addition to getting it done swiftly," White House spokeswoman Caitlin Hayden says of a proposed executive order to strengthen critical infrastructure IT.
Making an appearance twice a year just to ask for additional budget will not cut it. The CISO needs to make sure the board members know that he or she is a true enabler of the business.
By participating in our annual Healthcare Information Security Today survey, you'll help us to track breach prevention trends and information security priorities at healthcare organizations of all sizes.
Federal authorities have charged 91 individuals, including physicians and nurses, in connection with multiple Medicare fraud schemes. Find out how much fraud was allegedly involved.
Windows 8 is coming soon. What are the security updates in Microsoft's new operating system? Which questions should security leaders weigh before upgrading? Forrester's Chenxi Wang offers insight.
To avoid large breach penalties, organizations must be proactive in HIPAA compliance efforts, advises Thor Ryan, chief security officer of the Alaska Department of Health and Social Services.
When managers commit financial fraud, their schemes tend to cost organizations twice as much as when non-managers instigate these crimes. That's one key finding of a new insider fraud study.
HIPAA compliance audits for 115 healthcare organizations will be completed by year's end, and federal officials are investigating options for how to continue the program beyond this first round.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.