With many questions left unanswered regarding comprehensive cybersecurity legislation, the future seems bleak. But there's hope, says Jacob Olcott, a former top Capitol Hill staffer on cybersecurity matters.
The firing of a hospital staff member who inappropriately accessed former Penn State football coach Joe Paterno's records sends a strong signal about the importance of protecting patient privacy.
Dice.com reports a 79 percent increase in the total number of information security jobs posted to its site. What are the five hottest career prospects for aspiring pros?
The National Institute of Standards and Technology issues preliminary guidance on BIOS integrity and common remediation enumeration. NIST also publishes its final guidance on key derivation.
Deven McGraw, co-chair of the Privacy and Security Tiger Team that's advising federal healthcare regulators, explains why she's frustrated by delays in rolling out new regulations to protect electronic health records and safeguard the exchange of patient information.
New York-Presbyterian Hospital has developed a breach response checklist that others should consider as they create their breach resolution game plans.
Healthcare organizations should carefully document all necessary breach investigation and notification actions and responsibilities to avoid chaos when an incident occurs, says Dawn Morgenstern, privacy official at the Walgreens national drugstore chain.
2011 has offered quite a number of tough lessons for security professionals. Here at (ISC)2, where security education is our focus, the close of another year raises the old teacher's question: "What have we learned, class?"
One key reason why encryption isn't more widely used in healthcare is that some information technology specialists have outdated perceptions about the technology, contends security expert Melodi Mosely Gates.
The bring-your-own-device trend is increasing, but work-place policies are not. ISACA's Ken Vander Wal says low employee awareness and the absence of any BYOD policy are to blame. So what can organizations do to fill their security gaps?
Vulnerabilities in applications developed for the Commonwealth of Pennsylvania contributed to a major security breach a few years back, one that state CISO Erik Avakian does not want repeated.
New York's Pace University has just announced its new Seidenberg Cyber Security Institute. What is the school's mission, and why is now the ideal time to open its doors to career-minded students?
Draft legislation establishing a public-private sector National Information Sharing Organization received generally favorable reviews from a panel of witnesses testifying before a House panel.
Contra Costa County, Calif., has sent out notification letters to residents whose names were referenced in a public document posted to the county's website regarding debts owed to the Health Services Department.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.