Although there's plenty of talk about cybersecurity threats involving devious international hackers, the real threat to the security of healthcare information, I believe, is staff members who aren't paying enough attention to the little details. The Gartner Group's John Pescatore said it well in a recent interview:...
The federal government's new list of major healthcare breaches is far too difficult to find. While the U.S. Department of Health and Human Services is living up to the letter of the law in posting the list deep within its Office for Civil Rights' Web site, it's sure making it difficult to reach the list.
C. Warren Axelrod is a veteran banking/security executive and thought-leader, and in an exclusive interview at the RSA Conference 2010 he discusses top security trends and threats, including:
Axelrod is currently executive advisor for the Financial...
Education and training are two of the key priorities of information security professionals and organizations in 2010. And professional certifications are at the heart of that training.
What's new in information security certifications? In an exclusive interview at RSA Conference 2010, W. Hord Tipton, Executive...
Application security is rapidly becoming the next hot focus area for information security professionals.
Momentum began to build in 2008, when Information Security Media Group's (ISMG) Application Security Survey showed that 90% of respondents saw application security as somewhat or a significant part of their...
The Information Security Today Career Trends Survey identifies three distinct education trends re: information assurance:
Information security professionals seek advanced degrees;
Organizations are footing at least part of the bill for training;
Online education is an increasingly common and effective...
Increasingly, digital forensics is an important element of an information security program for organizations of all types and sizes.
But where can security leaders find qualified forensics professionals? How can these professionals obtain the skills and expertise they need to be successful?
Rob Lee of Mandiant...
Let's give BlueCross and BlueShield of Tennessee some credit for acknowledging that it has spent more than $7 million so far dealing with the aftermath of the theft of 57 unencrypted hard drives from a call center.
That breathtaking sum makes it crystal clear that potential data breaches have huge business...
More than $750 million worth of federal grants will fund state health information exchanges as well as new regional extension centers offering healthcare IT training, according to the U.S. Department of Health and Human Services.
The rules of job seeking are in constant flux - particularly in information security, where job demands and requirements are ever-evolving.
Where does that leave a job seeker looking to stand out from the crowd?
The following are strategies offered by information security hiring managers: