"Okay, we have bad guys that might be in the system, but at least we're watching them every minute and hopefully detecting them before they do anything too bad," RSA Chief Technology Officer Bret Hartman says.
The cost savings can be significant, but cloud computing also promises to help healthcare organizations manage risks and achieve business continuity goals.
Researchers explore adapting geolocation technology to identify where data reside on the cloud so organizations can comply with IT security laws and regulations, RSA Chief Technology Officer Bret Hartman says.
The innocent use for three years of a Yahoo calendar application exposed personally identifiable information of 878 patients at the Department of Veterans Affairs' Chicago Healthcare Systems, a violation of VA policy.
With more than 220 major health information breaches reported to federal authorities so far under the HITECH Act requirements, healthcare organizations are looking for effective strategies to prevent breaches and avoid headlines. One critical element to any breach prevention strategy is beefing up network...
With a hodgepodge of networks, applications and operating systems to manage - maintaining security and preventing breaches can be difficult. The challenges are daunting, but solutions are at hand.
This is the perspective of Roark Pollock of HP Tippingpoint. In an interview, Pollock discusses three specific...
The plan calls on Federal CIO Vivek Kundra to publish within the next six months a strategy to accelerate the safe and secure adoption of cloud computing across the government.
How can you recognize the intent of your colleague and perhaps prevent him from manifesting as a true insider threat? Blogger Upasana Gupta provides the answer.
Key factors making the security landscape riskier are the rapid rise of social networking, the growing reliance on cloud computing and the growing sophistication, criminalization and organization of hackers, a new survey shows.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.