"We find it hard to believe that there are any reasons or basis to oppose this legislation," presidential counterterrorism adviser John Brennan says of the Cybersecurity Act of 2012. "I'm just very puzzled as to why individuals would oppose this."
The Office of Management and Budget is now reviewing both rules for Stage 2 of the HITECH Act electronic health record incentive program - the final step before publication.
"To say I'm disappointed is a tremendous understatement," says Senate Majority Leader Harry Reid. "I thought we'd all put national security above partisan politics."
Accretive Health, a Chicago-based billing and collections company, has agreed to pay $2.5 million to settle a Minnesota lawsuit filed following a data breach. Find out all the details.
Amidst the hepatitis C outbreak at Exeter Hospital in New Hampshire, we need to ask: How could this happen? How could a medical technician even be hired after being fired at least twice by other hospitals?
After a breach, some organizations meet the minimum requirements for notification and then hope for the best. The Utah Department of Health is taking a very different approach that's worthy of imitation.
The Cybersecurity Act of 2012 is finally coming up for debate on the Senate floor, and a number of senators say they'll introduce amendments to tweak the bill to their liking.
In the latest update, much was left unsaid about the Global Payments data breach. And if I were a Global customer or card-issuing entity, I'd have some serious follow-up questions.
The Privacy and Security Tiger Team is hammering out recommendations for how best to authenticate the identities of physicians and other individuals who electronically exchange health information. Find out what's under consideration.
President Obama endorses the Cybersecurity Act of 2012 despite the removal of provisions from an earlier version of the bill that would have given the federal government authority to regulate the mostly privately owned critical national IT infrastructure.
A total of 464 major U.S. health information breaches have affected 20.8 million individuals since September 2009. Find out all the latest details about major additions to the breach list.
Debate surrounding the Cybersecurity Act has focused on whether the government should regulate privately owned, critical IT systems. But the bill also would make significant changes on how government governs IT security, co-sponsor Sen. Tom Carper says. See how.
Blaming developers for application security problems is the wrong thing to do. Here are five reasons why application security development fails in the software development ecosystem of many companies.
ISACA just issued COBIT 5 for Information Security, a business-centric approach to governance and IT management. ISACA's Robert Stroud explains what COBIT 5 means to your organization.
A new application for Apple mobile devices is designed to help healthcare organizations assess whether an incident is a breach that must be reported to federal authorities. Find out how it works.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.