Information security incidents are more sophisticated - and so are the criminals who perpetrate them. This raises the bar for professionals seeking careers in incident response in 2011.
Following is the latest state-by-state list of academic institutions selected and approved by the NSA and DHS as Centers of Academic Excellence in information assurance.
Good start, but we've still got a long way to go. This statement sums up industry experts' reactions to the two cyber fraud advisories issued this week to help organizations prevent ACH fraud and other crimes.
As the federal government attempts to crack down on Medicare and Medicaid fraud, officials have discovered that most medical schools don't offer training on how to comply with federal fraud and abuse laws.
In light of a survey confirming that medical students aren't getting enough training on how to comply with Medicare and Medicaid laws aimed at preventing fraud and abuse, federal authorities will prepare educational materials on the subject.
When it comes to business continuity and disaster recovery planning, it isn't the cause of the disaster that's the concern - it's the potentially devastating effects.
The level of application security threats is rising, but the level of response is not. "That's a serious disconnect," says Jeff Williams, chair of the OWASP Foundation.
To help fight fraud, computer scientists from the National Institute of Standards and Technology offer some insight on how to protect commercial and consumer computers from keylogger infection.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.