Removing provisions from the original bill to grant the federal government authority to impose standards on the mostly privately-owned critical IT infrastructure is a concession to win votes from Republicans, who oppose regulation.
Organizations first using the cloud have the chance to test and identify issues. Yet, many neglect to do so, says Gartner's Anton Chuvakin, who offers recommendations for secure cloud computing.
The Department of Health and Human Services is offering one-year fellowships to infuse new ideas into several key health technology projects. Find out the details about these opportunities.
Which personality types are best suited for information security careers? Laurence Shatkin, author of "50 Best Jobs for Your Personality," shares tips for how to find the job that's right for you.
One of the final rules for Stage 2 of the HITECH Act electronic health record incentive program has moved a step closer to publication. The Office of Management and Budget is now reviewing the meaningful use rule.
New federal guidance on how to exchange lab test results using the Direct Project protocol requires that senders must get notification that delivery succeeded or failed.
St. George's Healthcare NHS Trust in London has been fined £60,000 by the UK Information Commissioner's Office after an individual's medical information was sent to the wrong address.
The Health Information Trust Alliance plans to make detailed recommendations for de-identifying patient information and using it for research. A new working group will issue guidance in phases.
Organizations using semantics and big data tools are creating a new position called data scientist to help uncover fraud and identify undetected vulnerabilities. Here are profiles of three leaders who have embraced this role.
The White House says an executive order signed by President Obama will help assure government access to networks during a national emergency, but a civil liberties group contends it gives the government authority to seize privately run networks.
The draft guidelines recommend developing system threat models, instituting a mobile-device security policy, implementing and testing a prototype of the mobile-device solution and securing a device before allowing user access.
Federal regulators have received a wide array of comments on preliminary plans for federal guidelines for health information exchange, with some advocating mandatory, rather than voluntary, standards.
Eight class action lawsuits filed in the wake of a 2011 data breach involving TRICARE, the military health program, and affecting nearly 5 million individuals have been consolidated into one case that will be handled by the U.S District Court in Washington, D.C.
A new guide has been released by the Information Commissioner's Office to help small and mid-sized businesses improve their IT security. Which threats should most concern them, and how can they use the guide?
A data scientist is a new breed of database professional who applies scientific analysis to large data sets to identify patterns and vulnerabilities. Here are five expert tips on how to qualify for the new role.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.