Khalid Kark, vice president at Forrester Research, recently wrote an in-depth report on healthcare information security in which he described five key principles.
In an interview, Kark discusses each principle, including:
Take a risk-based approach and look beyond regulatory compliance, focusing instead on...
It's hard to place a value on an intrusion detection system until you see the system in action. CIO Charles Christian at Good Samaritan Hospital in Vincennes, Ind., recently discovered just how worthwhile his intrusion detection investment really is.
"We are providing a technical solution that will eliminate the need for a lot of cyber professionals because we just don't have enough of them," Zalmai Azmi says.
Can technology replace the IT security professional to safeguard government information systems?
Zalmai Azmi, the former Federal Bureau of...
Provisions of the bill would help develop a skilled government infosec workforce, prioritize federal cybersecurity R&D, improve the transfer of cybersecurity technologies to business and promote cybersecurity education and awareness.
"A key reason for these weaknesses is that NASA has not yet fully implemented key activities of its information security program to ensure that controls are appropriately designed and operating effectively," a GAO director tells Congress.
Interview with James Van Dyke of Javelin Strategy & Research
Identity fraud crimes expanded at a 12% rate in 2009. What can we expect to see in 2010?
Javelin Strategy & Research is out with its latest Identity Fraud Study. For insight on the study results and what they mean to organizations across industry,...
Dena Haritos Tsamitis has an ambitious goal for the year: to improve cyber awareness among 10 million people globally.
The Director of Education, Training and Outreach at Carnegie Mellon University's CyLab, Dena discusses:
The cyber awareness challenge among people of all ages;
Effective techniques for...
What are the top fraud trends facing financial institutions in 2010?
Gartner's Avivah Litan shares her insights in an exclusive interview with Information Security Media Group's Linda McGlasson, discussing:
Increased number of attacks on strong authentication;
How to handle ACH fraud;
The biggest security...
I'm excited about today's launch of the 2010 Banking Information Security Today Survey, and you should be, too.
Think about it: Identity theft, fraud, regulatory compliance, vendor management, security awareness, risk management, privacy. These topics have no industry loyalty; they're common to all public and...
President Obama this past week made strong remarks to spur Congress and populist support toward banking regulatory reform.
But what's likely to happen? And when?
Christie Sciacca, formerly with the Federal Deposit Insurance Corporation, discusses:
The substance of Obama's proposals;
What's likely to occur in...
Passwords are the bane of my existence -- probably yours, too. In order to be a good, secure, computer and Internet user, ideally I should have a different password for every single application I use, website I register to, and place I visit on the Internet. I frequently have at least 10 to 15 different passwords and...