Hospitals should use a team approach to creating breach detection and breach notification strategies. That's the advice of Gerry Hinkley, senior partner at the law firm Pillsbury, Winthrop, Shaw and Pittman.
An association of healthcare CIOs has prepared a lengthy, harsh critique of proposed rules for the Medicare and Medicaid electronic health record incentive program.
The group advocates substantial revisions in the criteria for the incentives, which were created by the HITECH Act, as well as a much less aggressive...
The list of 36 recent major breaches of healthcare information posted on a government Web site likely represents a small fraction of the significant breaches in healthcare in recent months, security experts say.
At a Senate hearing, Michael McConnell, the former director of national intelligence, added his voice to the growing chorus of cybersecurity experts who see dire consequences of a virtual attack on America's critical IT systems.
Application security is rapidly becoming the next hot focus area for information security professionals.
Momentum began to build in 2008, when Information Security Media Group's (ISMG) Application Security Survey showed that 90% of respondents saw application security as somewhat or a significant part of their...
The Information Security Today Career Trends Survey identifies three distinct education trends re: information assurance:
Information security professionals seek advanced degrees;
Organizations are footing at least part of the bill for training;
Online education is an increasingly common and effective...
The issue of how existing online banking networks could be used to ease the exchange of healthcare information will be addressed at a "medical banking" conference in Atlanta Feb. 28-March 2.
The Medical Banking Institute is sponsored by the HIMSS Medical Banking Project. The Healthcare Information and Management...
Increasingly, digital forensics is an important element of an information security program for organizations of all types and sizes.
But where can security leaders find qualified forensics professionals? How can these professionals obtain the skills and expertise they need to be successful?
Rob Lee of Mandiant...