Social media sites are changing the rules of job search, offering a new relationship-based approach that allows individuals and organizations to build communities through online profiles, affinity groups and networks of contacts.
One goal of Duke University's new health informatics program, which launches this fall, is to build awareness of information security and privacy issues among future IT leaders. That's the word from W. Ed Hammond, Ph.D., director of the new Duke Center for Health Informatics.
Increasingly, digital forensics is an important element of an information security program for organizations of all types and sizes.
But where can security leaders find qualified forensics professionals? How can these professionals obtain the skills and expertise they need to be successful?
Rob Lee of Mandiant...
Provisions of the bill would help develop a skilled government infosec workforce, prioritize federal cybersecurity R&D, improve the transfer of cybersecurity technologies to business and promote cybersecurity education and awareness.
Dena Haritos Tsamitis has an ambitious goal for the year: to improve cyber awareness among 10 million people globally.
The Director of Education, Training and Outreach at Carnegie Mellon University's CyLab, Dena discusses:
The cyber awareness challenge among people of all ages;
Effective techniques for...
Demand for qualified information security professionals is beginning to grow in healthcare.
The HITECH Act, which established tougher penalties and broader enforcement of enhanced versions of the HIPAA privacy and security rules, is proving to be a powerful catalyst for ramping up information security. Plus, as...
When it comes to enterprise security, an organization gets its tone from the top - even when the tone is set accidentally.
How do you set the right tone? That's the topic of the new book from former CISO Jennifer Bayuk: "Enterprise Security for the Executive: Setting the Tone from the Top."
In an interview about...
Information Security Media Group (ISMG) announces the launch of HealthcareInfoSecurity.com, a multimedia site providing news, insights and education on information security, risk management and privacy in the healthcare industry.
Career Insights from Srinvivas Mukkamala of New Mexico Tech.
Education, skills, experience - what exactly does it take to make it in an information security career today?
Srinivas Mukkamala, an educator and practitioner, offers unique insight on:
The necessary mindset for an information security professional;...
Welcome to HealthcareInfoSecurity.com, a media site with news, insights and education on healthcare privacy, risk management and information security.
Information Security Media Group, which offers similar information security/risk management sites for banking, credit unions and government, brought me on board to...
Johns Hopkins University's-Whiting School of Engineering is now offering a new part-time graduate program in information security.
This MS degree program is an effort toward filling the surging demand for cyber engineers and scientists with technical expertise in information assurance (IA) within government and...
Credit reports, social networks and international background checks - these are three of the hottest topics in employment background screening, according to Employment Screening Resources (ESR), a CA-based firm.
In an exclusive interview, Lester Rosen, President and CEO of ESR, discusses:
The top 10 trends in...
As part of its cybersecurity workforce development initiative, Lockheed Martin implements a cyber university to offer training and certification to its employees.
With Howard Schmidt's appointment as national cybersecurity coordinator, his role as president of the Information Systems Security Association (ISSA) has been filled by Kevin Richards, a risk management advisor with Crowe Horwath.
In an exclusive interview, Richards discusses:
Top agenda items for ISSA in...
Malicious criminal attacks have doubled, and the average cost of a data breach has increased to $204 per compromised record.
These are the headlines from the 5th annual "Cost of a Data Breach" study by the Ponemon Institute.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.