Debate surrounding the Cybersecurity Act has focused on whether the government should regulate privately owned, critical IT systems. But the bill also would make significant changes on how government governs IT security, co-sponsor Sen. Tom Carper says. See how.
What exactly is continuous monitoring - and why is it so hard for organizations to get it right?
It is one of the most discussed and least understood concepts in enterprise risk management today. Fundamentally, continuous monitoring is about deploying systems to examine all of the transactions and data processed...
The FCC recently set aside broadband spectrum for wireless patient monitoring systems. How should the industry respond to the security risks? Medical device expert Dale Nordenberg, M.D., offers insight.
An Obama administration memo, issued by U.S. Special Counsel Carolyn Lerner, cautions federal agencies that interfering with e-mails used by government employees to unveil misconduct could be unlawful.
Federal action to set aside broadband spectrum for wireless patient monitoring systems has the potential to improve treatment without increasing risks, says medical device expert Dale Nordenberg, M.D.
Some organizations proudly tout their privacy protection policies. Others, such as The Everett Clinic in Washington state, actually enforce their policies with bold action.
NIST's Ron Ross will be quite busy at RSA Conference 2012, not only promoting revised guidance on security and privacy controls to be unveiled at the securing conclave, but also participating in a panel on one of his favorite topics: continuous monitoring.
People, as much as anything else, are a critical aspect of information risk management, and businesses and government agencies must monitor employees - and educate them, as well - to thwart a potential threat from within.
As organizations move to the continuous monitoring of their IT systems to assure they're secure, they rely much more on automated processes. But don't forget the role people play.
Here's why it's important to carefully consider offering free credit monitoring, as well as breach prevention details, to the victims of major information breaches.
New guidance from the National Institute of Standards and Technology defines an information security continuous monitoring strategy and shows how organizations can create an information security continuous monitoring program.
Maimonides Medical Center uses new technology to help it monitor electronic access to patient information to guard against snooping and comply with HIPAA.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.