"Clearly, the market has not developed ... on its own the cybersecurity requirements," John Brennan says. "Of course, if it did, then we wouldn't have these intrusions and the billions of dollars of losses that companies are now writing off."
The great thing about fraud examination is that you can really play to your own strengths when choosing a career. The following six job roles are just a few of the career paths a fraud examiner might take.
The federated data model of a long-running Massachusetts HIE has its members safeguarding their own data. Find out the other ways that "pushing" data helps the New England Healthcare Exchange Network protect patient information.
Google will pay $22.5 million to settle FTC charges that it misrepresented its privacy promises to Apple Safari users. The fine is the largest penalty the FTC has ever obtained for violation of one of its orders.
CSC's Sam Visner sees organizations, in growing numbers, thinking more intelligently about cloud computing, its security and architecture. Yet, he says, they're being very deliberate in their approach in adopting cloud computing.
To protect beneficiaries from identity theft, the Medicare program must change its identification cards, a new Government Accountability Office report urges. Find out what GAO recommends.
The information security job market is rapidly growing, with positions needed in areas such as application security. But finding the talent is difficult, says Tom Silver of Dice.com. Find out why.
Understanding threats and identifying modern attacks in their early stages is key to preventing subsequent compromises, and proactively sharing information among organizations is an increasingly effective way to identify them.
In this week's breach roundup, read about the latest incidents, including Stanford Hospital reporting a second breach in less than a year and a stolen thumb drive affecting 14,000 Oregon patients.
How will a coalition of 21 private insurers, government agencies and others work together to thwart healthcare insurance fraud? Lee Arian of WellPoint provides some insights.
More organizations are expected to purchase cyber insurance in the coming years as risk managers become more involved in buying these types of policies.
The United Kingdom and the United States are both cracking down on healthcare organizations that have experienced information breaches. But they're taking very different approaches. Which approach will prove most effective?
John Halamka, M.D., CIO at Beth Israel Deaconess Medical Center in Boston, describes an 18-month privacy and security compliance effort that includes a focus on mobile device security.
There have never been so many job opportunities for privacy professionals. Nor have there ever been so many challenges. Trevor Hughes of the IAPP discusses what it takes to grow a privacy career.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.