The continuing loss of data to China suggests that the federal government should carefully assess the cybersecurity implications associated with the expansion of Chinese cloud and mobile providers in the U.S.
Consumer advocates are praising many of the privacy and security provisions of the final rules for Stage 2 of the HITECH Act EHR incentive program but lamenting some omissions. Find out the details.
The final rules for Stage 2 of the HITECH electronic health record incentive program contain multiple provisions regarding privacy and security. Find out what experts have to say about the merits of the new requirements.
Cyber is part of our everyday lives. Still, in many cases, a natural - or perhaps an unnatural - divide exists between the virtual and physical worlds. This is especially true in the way we deal with crime.
One takeaway from the $1-billion-plus verdict against Android-maker Samsung for infringing Apple patents is that the users of infringed technology also could be held legally liable, patent attorney Jim Denaro says.
Advice from the report, Bring Your Own Device: A Tool Toolkit to Support Federal Agencies Implementing BYOD Programs, is applicable to all types of public and private organizations.
Likening the government's seizure of domain names to that of printing presses, civil libertarians contend such actions could violate First Amendment free speech protections.
The two final rules for Stage 2 of the HITECH Act's electronic health record incentive program were unveiled Aug. 23. Find out what the rules have to say about encryption.
By combining responsible management, risk management and compliance functions and internal audits, organizations will go far in securing their data and systems, says PricewaterhouseCoopers Partner Carolyn Holcomb.
Information sharing has been trending upward, according to data from the monthly cybersecurity index. And while it's not surprising, it is "gratifying," says index co-publisher Dan Geer.
COBIT 5 for Information Security comes at a time when the IT threat landscape is changing drastically. ISACA's Robert Stroud explains how organizations can use the framework to mitigate the risks.
Understanding threats and identifying modern attacks in their early stages is key to preventing subsequent compromises, and proactively sharing information among organizations is an increasingly effective way to identify them.
More organizations are expected to purchase cyber insurance in the coming years as risk managers become more involved in buying these types of policies.
The United Kingdom and the United States are both cracking down on healthcare organizations that have experienced information breaches. But they're taking very different approaches. Which approach will prove most effective?
The benefits from employing social media as a way to connect with stakeholders outweigh the risks, says David Bradford, the editor of a new survey of risk managers. Still, he says, the risks must be adequately addressed.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.