Sen. Susan Collins, who, like President Obama, backs the Cybersecurity Act, cautions the president against issuing an executive order to protect the nation's critical IT, saying it would send an signal that congressional action isn't urgently needed.
Mike Mitchell, who serves as chairman of the PCI Security Standards Council, says mobile is a focus for leaders in the payment security space. So does the PCI Council expect emerging tech to influence the PCI-DSS?
An advisory panel wants a multi-factor authentication requirement included in Stage 3 of the HITECH Act electronic health record program. Find out under what circumstances that requirement would apply.
Organizations must carefully consider patch management in the context of overall IT security because it's so important to achieving sound security. Read about NIST's recommendations on how best to implement patch management.
In a merger, communication is essential for ensuring security and privacy challenges are met, says Christopher Paidhrin of PeaceHealth Southwest Medical Center, whose parent company recently went through a merger and will soon undergo another.
To address the security and privacy challenges magnified by the velocity, volume and variety of big data, the Cloud Security Alliance has formed a big data working group. What are the group's objectives?
What's the best way to prepare to comply with HITECH Stage 2 privacy and security requirements? Federal privacy officer Joy Pritts advises healthcare organizations to start by conducting a thorough risk assessment.
The Democratic Party platform on cybersecurity suggests that President Obama will take unilateral action to safeguard the nation's critical IT infrastructure because of Congress' inability to enact comprehensive cybersecurity legislation.
While the Office of the National Coordinator for Health IT continues work on mobile device security guidance for smaller healthcare organizations, a researcher offers insights on steps these providers can take now to improve security.