One of the final rules for Stage 2 of the HITECH Act electronic health record incentive program has moved a step closer to publication. The Office of Management and Budget is now reviewing the meaningful use rule.
Organizations using semantics and big data tools are creating a new position called data scientist to help uncover fraud and identify undetected vulnerabilities. Here are profiles of three leaders who have embraced this role.
The White House says an executive order signed by President Obama will help assure government access to networks during a national emergency, but a civil liberties group contends it gives the government authority to seize privately run networks.
The draft guidelines recommend developing system threat models, instituting a mobile-device security policy, implementing and testing a prototype of the mobile-device solution and securing a device before allowing user access.
Eight class action lawsuits filed in the wake of a 2011 data breach involving TRICARE, the military health program, and affecting nearly 5 million individuals have been consolidated into one case that will be handled by the U.S District Court in Washington, D.C.
A new guide has been released by the Information Commissioner's Office to help small and mid-sized businesses improve their IT security. Which threats should most concern them, and how can they use the guide?
A data scientist is a new breed of database professional who applies scientific analysis to large data sets to identify patterns and vulnerabilities. Here are five expert tips on how to qualify for the new role.
The FCC recently set aside broadband spectrum for wireless patient monitoring systems. How should the industry respond to the security risks? Medical device expert Dale Nordenberg, M.D., offers insight.