The possibility grows that hackers could take away control of the car from drivers as more automakers provide vehicle-to-vehicle and vehicle-to-infrastructure communications networks to third-party development.
"The effort with which an organization can recognize, analyze and respond to an incident will limit the damage and lower the cost of recovery," says Don Weber, former incident response professional at IBM.
The 2010 HIMSS Security Survey confirms that healthcare organizations are making inadequate progress on ensuring the security of electronic health records and other patient information, says security expert Lisa Gallagher.
American consumers need to know that personal health records must follow government-mandated guidelines for ensuring privacy and security, just as is the case for electronic health records. Otherwise, the use of PHRs may never become widespread.
House GOP members, including Texan Mike McCaul (pictured), are set to gain influence on IT security matters as they're poised to take over the chairmanships of key committees with cybersecurity oversight.
When the Medicare program suspended payments to 253 provider organizations in 2007 and 2008, the action was almost always based on evidence of fraud, rather than overpayment errors, a new report shows.