We all can see the technological and market forces converging to necessitate and enable electronic healthcare records.
But how does this transition impact privacy and compliance within an organization? What are the ramifications for IT and security departments?
Kim Singletary, Solutions Marketing for McAfee,...
We all can see the technological and market forces converging to necessitate and enable electronic healthcare records.
But how does this transition impact privacy and compliance within an organization? What are the ramifications for IT and security departments?
Kim Singletary, Solutions Marketing for McAfee,...
Social networking. Cyberbullying. Identity theft.
There are myriad threats to children as they explore their online universe. And to counter these threats is Safe and Secure Online, a new interactive presentation that brings information security professionals into classrooms to give sound advice to 11-14-year-old...
Ability to identify and respond to threats become more of a challenge in decentralized and especially large IT organizations, says California CISO Mark Weatherford.
Your organization has been breached - how should you immediately respond? How should you not respond?
Alysa Hutnik, attorney with Kelley Drye in Washington, D.C., specializes in information security and privacy, counseling clients on what to do after a security breach. In an exclusive interview, Hutnik...
We've emerged from a global financial crisis, and now regulatory reform is coming to financial services.
What do these events mean for the financial regulatory agencies - especially in terms of securing access to sensitive data?
John Bordwine, Public Sector CTO at Symantec, tackles this question, discussing:
...
More than half of current cyber attacks against businesses and government agencies are focused on two common vulnerabilities, according to "The Top Cyber Security Risks," a new report based on data from actual attacks.
Organizations are doing a good job protecting their operating systems, but they're leaving their critical applications vulnerable to dangerous cyber threats.
This is the key takeaway - and to some extent the surprise - of the new Top Cybersecurity Risks report released on Sept. 15 by TippingPoint, Qualys, the...
Legal Insights on Data Privacy Trends and Breach Response
Your organization has been breached - how should you immediately respond? How should you not respond?
Alysa Hutnik, attorney with Kelley Drye in Washington, D.C., specializes in information security and privacy, counseling clients on what to do after a...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.