White hat hacker Barnaby Jack, who passed away July 25, will be remembered for his demonstrations that dramatically spotlighted the vulnerabilities of ATMs and medical devices.
IT security pros see metrics as a useful tool to validate operational performance. But many organizations' top leaders evaluate security on cost. It's time to bridge that gap.
There's been a lull in big healthcare data breaches hitting the federal "Wall of Shame" tally so far in 2013. But that will likely change soon. Find out why.
Because state HIEs vary in connectivity and interoperability levels, secure e-mail based on the Direct Project offers a dependable way of sharing patient data during a disaster, says Tia Tinney of the Southeast Region Collaborative for HIT.
New state health insurance exchanges will face many security and privacy hurdles. But ensuring that consumer information is secure with data handlers on the front end is a critical first step.
Angered over the Edward Snowden revelations, DEF CON says the feds should take a 'time-out' from this year's hackers' conference. But a top DHS cybersecurity policymaker says he's still invited to participate in a conclave panel discussion.
The recent firings of six workers at Cedars-Sinai Medical Center offers yet another reminder for health records snoopers everywhere: Curiosity kills your job.
Addressing cyber-attacks is not just a technology issue. It requires a holistic view from the entire organization, says ISACA's Jeff Spivey, who emphasizes the need for a framework approach to security.
Our analysis of U.S. government labor statistics shows a sizable increase in the IT security workforce. But the way the occupation is defined may have as much to do with the increase as the number of jobs themselves.
Reports continue to show that an overwhelming percentage of applications have serious vulnerabilities. The important takeaway here is that application security has not improved in the last 10 years.
Whether or not Congress enacts cyberthreat intelligence sharing legislation, the IT security community is moving forward with its own information sharing initiatives, MS-ISAC Chairman William Pelgrin says.
RSA Chief Information Security Officer Eddie Schwartz is heading a new task force that he hopes will help develop the next generation's well-trained, rightly skilled cybersecurity workforce.
When Richard Nealon first sat for his CISSP exam, he was struck by how U.S.-centric the questions were. Since then, he has strived to promote greater awareness of global information security concerns.
Recent moves by federal agencies are finally giving medical device security the long overdue spotlight it deserves. And if you're looking for best practices, the VA has some to offer.
Secure messaging based on the Direct Protocol may eventually be applied globally because of worldwide interest in health information exchange, some backers say. The protocol incorporates international standards.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.