Banking regulators have begun examining institutions for conformance to the FFIEC Authentication Guidance. What gaps have they found? Terry Austin of Guardian Analytics offers insight and security tips.
Challenged by sophisticated threats and the complexity and cost of security, global leaders wonder: "Is my organization going to be the next breach headline?" IBM's Latha Maripuri discusses global trends.
"People appreciate being contacted when particular transactions look risky," says Peter Tapling, President and CEO of Authentify. "Out-of-band authentication provides the opportunity to do that in real-time, at very low cost to the institutions."
Proposed rules for Stage 2 of the HITECH Act electronic health record incentive program, to be unveiled today, will contain a substantial list of new privacy and security requirements, federal officials confirm.
Implementing a mobile device management system is critical for ensuring the security of patient information. But what questions should organizations ask mobile device management vendors to ensure they pick the right system?
To protect privacy without adversely affecting the quality of healthcare, hospitals and clinics need to monitor records access and use access controls, a medical informatics expert at Kaiser Permanente says.
The National Institute of Standards and Technology is establishing the National Cybersecurity Center of Excellence, a public-private collaboration aimed at accelerating the widespread adoption of integrated cybersecurity tools and technologies.