John Halamka, M.D., one of the nation's leading healthcare CIOs, says a top compliance project for this summer is improving mobile device security
at Beth Israel Deaconess Medical Center in Boston.
The Health Information Trust Alliance plans to make detailed recommendations for de-identifying patient information and using it for research. A new working group will issue guidance in phases.
Organizations using semantics and big data tools are creating a new position called data scientist to help uncover fraud and identify undetected vulnerabilities. Here are profiles of three leaders who have embraced this role.
The White House says an executive order signed by President Obama will help assure government access to networks during a national emergency, but a civil liberties group contends it gives the government authority to seize privately run networks.
The draft guidelines recommend developing system threat models, instituting a mobile-device security policy, implementing and testing a prototype of the mobile-device solution and securing a device before allowing user access.
Federal regulators have received a wide array of comments on preliminary plans for federal guidelines for health information exchange, with some advocating mandatory, rather than voluntary, standards.
Eight class action lawsuits filed in the wake of a 2011 data breach involving TRICARE, the military health program, and affecting nearly 5 million individuals have been consolidated into one case that will be handled by the U.S District Court in Washington, D.C.
A new guide has been released by the Information Commissioner's Office to help small and mid-sized businesses improve their IT security. Which threats should most concern them, and how can they use the guide?
A data scientist is a new breed of database professional who applies scientific analysis to large data sets to identify patterns and vulnerabilities. Here are five expert tips on how to qualify for the new role.
A new U.S. Food and Drug Administration proposed rule requiring unique identifiers on medical devices is designed to help improve patient safety. But when would the rule take effect?
In a tribute, we remember Terrell Herzig, information security officer at UAB Health System, an innovator who was passionate about sharing best practices for protecting sensitive information.
The FCC recently set aside broadband spectrum for wireless patient monitoring systems. How should the industry respond to the security risks? Medical device expert Dale Nordenberg, M.D., offers insight.
The role of identity and access management is as critical as ever. But the demands of the role? They are radically different, says Sam Curry, CTO of RSA, who discusses the new skills needed.
Information security isn't just the domain of those branded information security professionals but also requires the knowledge of nearly every other IT occupation as well as individuals in many non-technology jobs, too.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.