The kind of detailed data analysis that helped statistician Nate Silver predict accurately the outcome of the U.S. presidential election could help enterprises using cloud-based SIEM to identify vulnerabilities, says Cloud Security Alliance's Jens Laundrup.
To know how best to respond to IT and communications failures, organizations first must collect information on such incidents, says Marnix Dekker, who co-authored a just-issued report on incidents for ENISA.
President Obama's re-election paves the way for continuation of the HITECH Act EHR incentive program and provides a perfect opportunity for the administration to toughen the program's privacy and security requirements.
Gov. Nikki Haley realizes the potential political consequences of a breach, which explains why she held three press conferences on three consecutive days to address her administration's response to a computer breach of the state's tax IT system.
Hurricane Sandy slammed the East Coast Oct. 29, causing widespread damage and power outages. As a result, business continuity plans are being put to the test. How are governments, financial institutions and healthcare organizations responding?
How can hospitals and physicians prepare to comply with the HITECH Act electronic health record incentive program's Stage 2 privacy and security requirements? Federal privacy officer Joy Pritts provides insights.
President Obama has not yet reviewed the draft of a proposed executive order to create a process to establish IT security best practices that private owners of critical infrastructure could voluntarily adopt, DHS Secretary Janet Napolitano says.
A group of highly respected IT security thought leaders is calling on the Obama administration to exercise existing powers to strengthen the processes the federal government employs to secure its information systems.