Community hospitals must become more vigilant about information security, especially as they apply for federal electronic health records incentive payments, says Chuck Christian, CIO at Good Samaritan Hospital in Vincennes, Ind.
Gelmato's technology adviser Ksheerabdhi Krishna says digital technology aimed to secure buildings can be reused to provide protection to data in the virtual world.
To help agencies secure their wireless networks and technologies, the Government Accountability Office came up with eight leading practices. For now, GAO says, wireless networks remain at an increased vulnerability to attack.
One of the more intriguing tradeoffs with information security is green IT, says Robert Brammer, Northrop Grumman Information Systems vice president of advance technology.
This week's top news and views: Congress returns to Washington, but few see passage of cybersecurity legislation and a call for CISOs to take the lead in helping transform state government. And don't miss our audio week-in-review podcast by Executive Editor Eric Chabrow.
"The purpose and needs for these is to establish those same business tools for information security professionals to enable them to make better business decisions," Center for Internet Security Chief Security Officer Steven Piliero says.
Multi-State Information Sharing and Analysis Center's new cybersecurity operation center near Albany, N.Y., should help state and local governments more effectively identify, prevent and mitigate cyber incidents, MS-ISAC founder Will Pelgrin says.
An (ISC)2 survey suggests that a Commission on Cybersecurity for the 44th Presidency paper backs a government-run board to oversee IT security certifications, a point disputed by the report's author. Where does the truth lie?
"The first question they are going to ask the external provider is: 'What kind of procedures will you follow for physically securing the servers, for assuring the authenticity of the log-in, for security of the data during transit to and from your site?'" IBM's Dave McQueeney says.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.