"The environment that started by supporting whistleblowers ... is essentially morphing into 'Gee, we as an organization need to be completely transparent, whether we want to or not,'" says Cal Slemp, managing director of Protiviti.
Cyber criminals typically will move on to a target that is much less secure but those behind advanced persistent threats will spend months if not years trying to penetrate an IT system until they succeed, says Dmitri Alperovitch, McAfee Labs threat research vice president.
Expanding use of secure messaging as well as remote access to information systems are key 2011 IT priorities for Shriners Hospitals for Children, says Bill Bria, M.D., chief medical information officer.
As it expands its presence in healthcare, Verizon has set the ambitious goal of issuing free digital credentials to 2.3 million clinicians, says Steven Archer, who heads the innovation incubator group at Verizon Business.
The Office of the Inspector General will scrutinize the privacy and security policies of the Department of Health and Human Services, as well as the details of the HITECH Act electronic health record incentive program.
As 2010 draws to a close, federal regulators have a long list of unfinished business in drafting regulations and launching programs to protect patient privacy and bolster information security, as mandated under the HITECH Act.
Not having an IT security certification doesn't disqualify you from getting that next job or promotion, but it could be a factor. Here are our picks of the five IT security certifications that will be most in demand in the new year.
The National Institute of Standards and Technology issues two special publications: SP 800-119, Guidelines for the Secure Deployment of IPv6 and SP 800-135, Recommendation for Application-Specific Key Derivation Functions.