Healthcare organizations need to rethink security best practices and tap new technologies as a result of the growth in health information exchange and the use of mobile devices, says researcher Carl Gunter.
One takeaway from the $1-billion-plus verdict against Android-maker Samsung for infringing Apple patents is that the users of infringed technology also could be held legally liable, patent attorney Jim Denaro says.
The Department of Veterans Affairs will soon solicit bids for a mobile device management system. Get the latest update on how the VA's plan to roll out more than 100,000 devices is evolving.
E-mail, IM, text messaging - we all increasingly depend on messaging technologies. And so do the fraudsters. Craig Spiezle of the Online Trust Alliance discusses how to mitigate our vulnerabilities.
Likening the government's seizure of domain names to that of printing presses, civil libertarians contend such actions could violate First Amendment free speech protections.
CSC's Sam Visner sees organizations, in growing numbers, thinking more intelligently about cloud computing, its security and architecture. Yet, he says, they're being very deliberate in their approach in adopting cloud computing.
Ron Ross, the NIST IT security and risk guru, sees cloud computing as a vehicle to help organizations implement an information risk management framework.
The two final rules for Stage 2 of the HITECH Act's electronic health record incentive program were unveiled Aug. 23. Find out what the rules have to say about encryption.
Targeted phishing attacks are at an all-time high, and one reason for the proliferation is a non-unified response from industry and government, says Peter Cassidy of the Anti-Phishing Working Group.
Visitors to the sites - applanet.net, appbucket.net and snappzmarket.com - will see a seizure banner that notifies them that the domain name has been seized by federal authorities.
More malware attacks fueled by Citadel and Reveton are getting attention from federal authorities, which say banking institutions and consumers should be on high alert. What can institutions do to mitigate emerging malware risks?
At St. Dominic-Jackson Memorial Hospital in Mississippi, a proactive breach prevention strategy has dramatically reduced privacy violations involving nosy healthcare workers inappropriately accessing medical records.
The Wisconsin Health Information Exchange uses a hybrid data model approach that lets members retain control over information, but makes security less complicated, says CEO Kim Pemble.
Secure is a possible state of affairs at a certain point in time. But rugged describes staying ahead of the threat over time. Rugged organizations create secure code as a byproduct of their culture.
Some U.S. federal agencies seem to be going too far in monitoring their employees' communications activities on their government-issued laptop computers.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.