Community hospitals must become more vigilant about information security, especially as they apply for federal electronic health records incentive payments, says Chuck Christian, CIO at Good Samaritan Hospital in Vincennes, Ind.
The recent WikiLeaks release of thousands of sensitive government documents puts security leaders on notice: The breach threat is real, and no organization is immune.
What's embarrassing about the WikiLeaks episode isn't just the precarious position the publication of diplomatic cables put the U.S. in with its allies but the likelihood that one, low-level analyst accessed sensitive data without authorization and then leaked them.
The Department of Veterans Affairs has taken steps to help ensure thumb drives lacking encryption cannot be plugged into its computers. The move comes following the discovery of an unencrypted drive containing personal information on veterans.
IT security weaknesses have exposed NASA to cybersecurity threats that are growing in scope and sophistication, the space agency's inspector general says.
The evolution of IT security requires human ingenuity. Machines are fast but dumb, yet using human brainpower can help reject quickly harmful traffic aimed to damage critical IT systems, says Phyllis Schneck, McAfee CTO/public sector.
The possibility grows that hackers could take away control of the car from drivers as more automakers provide vehicle-to-vehicle and vehicle-to-infrastructure communications networks to third-party development.
"The effort with which an organization can recognize, analyze and respond to an incident will limit the damage and lower the cost of recovery," says Don Weber, former incident response professional at IBM.
Information security incidents are more sophisticated - and so are the criminals who perpetrate them. This raises the bar for professionals seeking careers in incident response in 2011.
Indiana Attorney General Greg Zoeller has sued health insurer WellPoint Inc., alleging the firm took too long to notify Indiana residents affected by a health information breach.
Could methods employed by the World Health Organization to quarantine people to prevent the spread of deadly diseases be a roadmap on how to prevent virtual viruses from spreading in the cyberworld?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.