Should software developers be held liable for their programming errors? A consortium of international cybersecurity experts says yes - and will present its plan for such a program on Tuesday. But at least one dissenting voice calls the effort "counterproductive and silly."
Faced with the threat of much stiffer penalties for data security violations and ramped-up enforcement at the federal and state levels, many hospitals are just starting to pay serious attention to security, contends security consultant Kate Borten. But they must go far beyond investing in new technologies to develop...
More than $750 million worth of federal grants will fund state health information exchanges as well as new regional extension centers offering healthcare IT training, according to the U.S. Department of Health and Human Services.
To make sure their information technology strategies adequately address the needs of physicians, many hospitals have designated a doctor to serve as chief medical informatics officer. These physicians are working closely with CIOs, CSOs and others to help select and implement I.T., including technologies to keep...
The rules of job seeking are in constant flux - particularly in information security, where job demands and requirements are ever-evolving.
Where does that leave a job seeker looking to stand out from the crowd?
The following are strategies offered by information security hiring managers:
With House passage of the Cybersecurity Enhancement Act, add one more piece of infosec legislation for the Senate to consider. Still, there's no guarantee that bill or any major IT security measure will be signed into law in 2010.
How do CIOs at community hospitals, which have limited resources, address data security challenges, such as compliance with the privacy and security provisions of the HITECH Act?
Charles Christian, CIO at Good Samaritan Hospital in Vincennes, Ind., also serves as the defacto chief security officer, dividing up...
Social media sites are changing the rules of job search, offering a new relationship-based approach that allows individuals and organizations to build communities through online profiles, affinity groups and networks of contacts.
A Florida health insurance company reports that two laptops were recently stolen from its corporate office in Gainesville. One of the laptops may not have been properly encrypted, according to the company.