The United Kingdom and the United States are both cracking down on healthcare organizations that have experienced information breaches. But they're taking very different approaches. Which approach will prove most effective?
A federal advisory committee has expressed support for the concept of eventually requiring multi-factor authentication for clinicians and other individuals involved in certain riskier electronic health information transactions.
The recent theft of an unencrypted laptop computer containing information on more than 9,500 patients of a hospital and a home health agency has Connecticut's Attorney General asking for an explanation.
Senate supporters of the Cybersecurity Act of 2012 failed to gain the 60 votes necessary to bring the measure up for a vote, a significant setback for those seeking enactment of a comprehensive cybersecurity law this year. The vote was 52 to 46.
Boards of directors continue to overlook IT risk management, security and privacy as a top agenda item, says Jody Westby of Carnegie Melon CyLab. Where are the organizational gaps that need to be filled?
Intuit and GE veteran Steve Bennett, chairman of the IT security software provider, replaces Enrique Salem, the longtime Symantec executive who had served as the company chief executive officer since April 2009.
Whether intentional or not, software features have the potential to leak sensitive information, corrupt data or reduce system availability. The National Institute of Standards and Technology's latest guidance aims to help organizations minimize vulnerabilities.