Federal regulators have published a final rule carrying out the Genetic Information Nondiscrimination Act, which prohibits the use of genetic information to make decisions about health insurance and employment.
An inspector general report cites seven incidents this past year at the Social Security Administration when individuals weren't disciplined for installing non-standard software that contained malware.
Nevada CISO Chris Ipsen says state governments must become more creative in how they provide IT security, by partnering with local and county governments, communicating more effectively their needs and leveraging best of breed solutions regardless from where they come.
The evolution of IT security requires human ingenuity. Machines are fast but dumb, yet using human brainpower can help reject quickly harmful traffic aimed to damage critical IT systems, says Phyllis Schneck, McAfee CTO/public sector.
Healthcare organizations offering free Wi-Fi service to patients and guests need to take multiple security steps, says security expert Christopher Paidhrin
The possibility grows that hackers could take away control of the car from drivers as more automakers provide vehicle-to-vehicle and vehicle-to-infrastructure communications networks to third-party development.
"The effort with which an organization can recognize, analyze and respond to an incident will limit the damage and lower the cost of recovery," says Don Weber, former incident response professional at IBM.
The new Congress likely won't cut EHR incentive funding, but it will keep a close eye on emerging HITECH Act privacy and security regulations, observers say.
Information security incidents are more sophisticated - and so are the criminals who perpetrate them. This raises the bar for professionals seeking careers in incident response in 2011.
The last Republican to chair the House committee with primary cybersecurity oversight says the incoming head of the panel is a technology whiz who understands the cyber equation.
This week's top news and views: The impact of the midterm elections on cybersecurity in Congress, White House issues secure cloud computing guidance and an IBM CTO speaks out on government cloud computing.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.