Nations' policies for mitigating cyberthreats can conflict with efforts to promote cyber-enabled global trade, cautions Allan Friedman, research director of the Brookings Institution's Center for Technology Innovation.
A new Ponemon Institute study shows the average annual cost of cybercrime for 60 major U.S. companies rose 26 percent this year. Find out some of the factors contributing to the rising cost.
Twitter's IPO filing sheds light on the social media company's perceived security risks. For example, it acknowledges the challenge of preparing for evolving cyberthreats.
Federal advisers heard concerns from healthcare providers, EHR software vendors and others this week about the cost and impracticality of a proposed requirement to offer patients an access report listing caregivers who had viewed their records.
Despite the government shutdown, Stage 2 of the HITECH Act financial incentive program for the meaningful use of electronic health records kicks off Oct. 1. Learn more about the privacy and security provisions and how to prepare.
While state health insurance exchanges have opened for business despite the partial shutdown of the federal government, two Department of Health and Human Services units that deal with privacy and security issues are virtually closed.
Individuals see information differently today than they did just a few years ago because of big data and that, in turn, influences how people perceive privacy. ISACA's Jeff Spivey explains.
Top executives at healthcare organizations must take the lead in overcoming a culture that portrays privacy and security as barriers, says Joy Pritts, chief privacy officer at the Office of the National Coordinator for Health IT.
With Congress back in Washington, lawmakers are focused on Syria, the federal budget and the debt limit. So cybersecurity is taking a backseat. Will that situation change soon?
Federal regulators are spearheading an effort to improve patient data matching with an aim of identifying best practices for bolstering patient safety. Learn why Russ Branzell of CHIME and others say the effort is so important.
Medical ID theft can be prevented by improving awareness of the threat among consumers and boosting detection by healthcare organizations, according to a new report. Learn about key recommendations.
Many chief information security officers have the business savvy and technical know-how to be their organization's chief information risk officer. But should CISOs assume that extra role?
As the Sept. 23 enforcement deadline for HIPAA Omnibus approaches, an error that many business associates are making is thinking that compliance can be achieved with a simple checklist, says consultant Andrew Hicks.
The NSA, in a highly classified program code-named Bullrun, used supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine encryption, according to a news report.
Because big data brings significant benefits - and risks - CEOs and boards of directors must take charge of developing privacy protection policies, ISACA International Vice President Jeff Spivey says.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.