Attempts to shame China haven't been effective in stopping that country from pilfering intellectual property from the computers of American companies, according to a new report to Congress from a special commission.
More than two-thirds of IT security specialists working for the U.S. federal government say their agencies are ill-prepared to adequately defend their IT systems, a new survey reveals.
In recent weeks, Google and Amazon have quietly begun offering standardized business associate agreements to healthcare clients using certain cloud services. Security experts say the move is significant.
Before hiring a cloud services vendor, healthcare organizations should demand answers to tough questions about privacy and security, says Phil Curran, a hospital CISO who has scrutinized many companies.
Consolidating Microsoft Active Directory isn't just a technical challenge, but a personnel one as well. Just ask Johnson Matthey's Steve Way, who had to calm dozens of administrators he labels as "masters of their own universe."
Hope springs eternal at the White House, at least when it comes to Congress passing meaningful cybersecurity legislation. Read about our exclusive conversation with a senior administration official.
Two recent incidents at Oregon Health & Science University involved inappropriate storage of unencrypted patient information in the cloud. Experts weigh in on the fogginess of HIPAA Omnibus regarding cloud providers.
Under HIPAA Omnibus, many cloud computing providers are considered business associates directly liable for HIPAA compliance. What safeguards to protect health data should covered entities expect cloud providers to implement?
Here are some questions we'd like to ask the former systems administrator at the National Security Agency to learn more about the motivation behind his leak of the U.S. government's top-secret information collection programs.
President Obama wants Americans to trust his administration on the way it collects data from Internet and telephone communications in the search for terrorists. Does the president deserve that trust?
Operating in a cloud environment opens up organizations to a new dimension of insider threat problems, says Alex Nicoll of Carnegie Mellon University's CERT Insider Threat Center.
NIST's Ron Ross sees the cloud as helping to reduce the complexity of keeping data secure. But security expert Eugene Spafford of Purdue University offers a different viewpoint in the first part of a two-part joint interview.
John Houston, CISO at University of Pittsburgh Medical Center, is keeping his eye on emerging threats, including the risks tied to medical devices linked to networks and the potential for DDoS attacks to spread to healthcare.
Accountable care organizations face complex data security and privacy issues as patient information is accessed and shared among many providers, says security expert Bill Fox.
CISO Mark Olson of Beth Israel Deaconess Medical Center offers detailed insights on the specific steps that medical device manufacturers can take to help ensure data security.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.