The administration is exploring issuing an executive order to direct federal agencies to secure the nation's critical infrastructure by working with the private sector to develop security standards, says John Brennan, assistant to the president for homeland security and counterterrorism.
The continuing loss of data to China suggests that the federal government should carefully assess the cybersecurity implications associated with the expansion of Chinese cloud and mobile providers in the U.S.
Congressional opponents who have blocked legislation to establish voluntary IT security standards for mostly privately owned critical information networks could end up funding such an initiative anyway. Read how.
William Henley, a financial services regulator for over 20 years, has just returned from a brief stint in the private sector. Learn how that experience re-shaped his thoughts on regulatory compliance.
Visa's new end-to-end encryption service aims to eliminate payment card data at the merchant level. Eduardo Perez of Visa's Risk Group discusses the security value of this emerging solution.
Thor Ryan, chief security officer at the Alaska Department of Health and Social Services, offers lessons learned as a result of his organization's $1.7 million settlement following a HIPAA compliance investigation triggered by a small breach incident.
A federal agency is offering a free online training program that provides useful insights on protecting information privacy. Learn how this clever training "game" works.
William Henley of the FDIC has just returned to banking regulation after a two-year stint working in the private sector. How did his business experience influence his approach to enforcing compliance?
Sen. Susan Collins, who, like President Obama, backs the Cybersecurity Act, cautions the president against issuing an executive order to protect the nation's critical IT, saying it would send an signal that congressional action isn't urgently needed.
An advisory panel wants a multi-factor authentication requirement included in Stage 3 of the HITECH Act electronic health record program. Find out under what circumstances that requirement would apply.
The PCI Security Standards Council aims to clarify points in existing data security standards that have spurred confusion. So what areas are proving the most puzzling? PCI's Bob Russo shares insights.
Consumer advocates are praising many of the privacy and security provisions of the final rules for Stage 2 of the HITECH Act EHR incentive program but lamenting some omissions. Find out the details.
The Democratic Party platform on cybersecurity suggests that President Obama will take unilateral action to safeguard the nation's critical IT infrastructure because of Congress' inability to enact comprehensive cybersecurity legislation.
Which data architecture model for health information exchanges - centralized, federated or hybrid - is the most secure? Some consumer advocates strongly favor the federated model. What do HIE leaders and security experts say?
When asked about their computing habits, a majority of those surveyed say they never use the cloud, though their online habits show that nearly all of them do.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.