White House Cybersecurity Coordinator Howard Schmidt unveils a government/private-sector strategy that the administration says would eventually let users obtain a single credential as a one-time digital password to transact business over the Internet.
The ongoing effort to enable the secure exchange of health information from coast to coast recently got a very important boost when five well-known healthcare organizations joined forces to serve as trailblazers.
Coreflood steals usernames, passwords and other private personal and financial information used for a variety of criminal purposes, including stealing funds from the compromised bank accounts.
The Office of the National Coordinator for Health IT plans to take an incremental approach to testing components of a new health information exchange architecture envisioned by the President's Council of Advisors on Science and Technology.
As Congress and the White House look for ways to cut the federal budget, one area that could prove dicey is IT security, contends Department of Homeland Security's Philip Reitinger.
Susan McAndrew of the HHS Office for Civil Rights discusses recent high-profile HIPAA cases, HIPAA enforcement training for state attorneys general and the pending HIPAA audit program.
Domain Name Security - it's one of the most neglected aspects of information security, but critical to healthcare organizations, says Mark Beckett of Secure 64.
The Oklahoma State Department of Health is notifying nearly 133,000 individuals about a health information breach involving the theft of a laptop computer containing personal information.
The Health IT Policy Committee has approved a long list of recommendations from its Privacy and Security Tiger Team that now will be considered for federal rules and regulations.
A consortium of five leading healthcare organizations hopes to demonstrate the secure national exchange of health information, says James Walker, M.D. of Geisinger Health System.
CISOs today are evolving into strategic and risk managers, going far beyond the old-fashioned role of working solely within the IT department to manage and protect data.
"It you were to ask me to rank order where industries are in terms of their cybersecurity capability, I think power is at or close to the bottom of the list, says Army Gen. Keith Alexander, head of the U.S. Cyber Command Commander and National Security Agency.
Smartphones are ubiquitous in organizations across industry today. But how secure are these devices -- and what security and liability vulnerabilities do they expose?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.