Social media aren't just coming - they're here. And senior leaders need to understand how to maximize Facebook, LinkedIn, Twitter and other popular sites, as well as how to protect their organizations from very real security risks.
In an exclusive interview, Prof. Sree Sreenivasan, Dean of Student Affairs at the...
A four-year, $15 million federally funded research project will yield strategies that hospitals, physicians and others can use to keep electronic health records private and secure, says Carl Gunter, the project's leader says.
A four-year, $15 million federally funded research project will yield practical, updated strategies that hospitals, physician group practices and others can use to keep electronic health records private and secure, the project's leader says.
Washington has become the third state to pass legislation incorporating the Payment Card Industry Data Security Standard (PCI) to help financial institutions recover costs from credit/debit card breaches.
Guidance on how organizations should protect the confidentiality of personal identifiable information, SP 800-122: Guide to Protecting the Confidentiality of Personally Identifiable Information, or PII, has been issued by the National Institute of Standards and Technology.
Everyone is talking about cloud computing these days - but are they having the right conversations?
H. Peet Rapp is an information security auditor who sits on ISACA's Cloud Computing Work Group, and he's co-author of the white paper Cloud Computing: Business Benefits With Security, Governance and Assurance...