Pace University's Seidenberg Cyber Security Institute plans to leverage public-private partnerships - a challenge for educational institutions. How will the institute help the private and public sectors meet their security needs?
Notifying patients about a healthcare information breach requires a "difficult balancing act" by entities to ensure that risks are not exaggerated, says attorney Robert Belfort, an expert in HIPAA compliance, fraud and abuse.
Steven VanRoekel says the mobile revolution will fundamentally change the way the federal government serves the public and its employees. But in outlining the Federal Mobile Strategy, the federal CIO hardly mentions security and privacy.
Funding would be through NIST's Small Business Innovation Research program that fuels technological innovation by strengthening the role small business plays in bringing to market innovations derived from federal R&D.
Intel CISO Malcolm Harkins explains why Intel embraced the bring-your-own-device trend and made it part of a strong mobile technology policy that revolves around employee accountability.
Given the plethora of guidance available, individual operators of the nation's critical infrastructure may be challenged in identifying the guidance that is most effective in improving their security posture, GAO's Gregory Wilshusen says.
To help prevent breaches, mobile devices should be encrypted even if storage of sensitive information on them is prohibited, says security expert Melodi Mosley Gates.
Filling information security roles is one challenge. Growing them is quite another. So, how do today's global leaders help their staff evolve and acquire the skill sets most in-demand?
With the spotlight on federal budget cutting, two Republican senators are pressing the acting head of the Medicare and Medicaid programs to start outlining her anti-fraud efforts aimed at eliminating waste.
A national network of regional cancer hospitals that has relied heavily on laptop computers is slowly phasing in iPads and iPhones, taking steps to mitigate the security risks involved.
A rule setting streamlined standards for electronic funds transfers in healthcare leaves some privacy issues fuzzy. But pending HIPAA modifications could provide clarification.
Three class action lawsuits have now been filed in the wake of a breach affecting 4.9 million beneficiaries in the TRICARE military healthcare program.
The controls create a baseline to properly address the unique elements of authorizing cloud products and services, including multi-tenancy, control of an infrastructure and shared resource pooling, Homeland Security CIO Richard Spires says.
When it's time to stand up in court and discuss forensic evidence in a legal matter, you need someone who knows your business best, says Greg Thompson, VP enterprise security services at Scotiabank Group.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.