Chief Risk Officer is one of the emerging roles in global business. But what does it take to succeed? "You have to go through the school of hard knocks -- have experience and have made mistakes along the way," says Kevin Blakely, CRO at Huntington Bank.
A new federal rule setting the final guidelines for Accountable Care Organizations under federal healthcare reform gives patients the opportunity to veto the sharing of their Medicare claims data with ACOs.
The BlackBerry disruption strikes at a core IT security precept: availability. Yet, as cybersecurity and IT architecture practitioner Winn Schwartau points out, it also raises the less-often talked about proposition of accountability.
Mark Weatherford, who also served as Colorado's chief security officer, will start work in mid-November in the new post, which absorbs responsibilities previously performed by Phillip Reitinger, now Sony's CISO.
The American College of Physicians has proposed revisions to federal privacy rules to strengthen protections for individuals who participate in medical research projects.
In the wake of Libyan ruler Moammar Gadhafi's death, U.S. banking institutions are on heightened alert for money-laundering and terrorist financing linked to Libya and other parts of Northern Africa.
Roger Baker, CIO at the Department of Veterans Affairs, outlines the department's mobile device security strategy, providing details on the rollout of iPhones and iPads.
By using federated digital credentials, the federal government has taken a significant step toward creating more efficiency to better serve the needs of the American people in the 21st century, Cybersecurity Coordinator Howard Schmidt says.
Instead of sabotage, as Stuxnet was used on Iranian nuclear centrifuges, Duqu is designed to gather intelligence that could help attackers mount a future digital assault on industrial control facilities.
Mike Brown and Amry Junaideen see audits as great tools to promote heftier IT security budgets, substantiating where dollars should be spent to safeguard an organization's information systems and assets.
Facial recognition, arguably, is the technology that most threatens individual privacy online, and that's on the mind of Senate Commerce Committee Chairman Jay Rockefeller, who has asked the FTC to report on its growing use.
Investigators have linked a retail-credit scheme to a pair of fraudsters who are believed to have stolen $9 million from 8,000 victims. How could such a scheme go undetected for 15 years?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.