2014 is finally the "The Year of Security." When the year stars fresh on the heels of the announcement that Target has suffered a data breach that impacts tens of millions of consumer payment cards ... that gets attention. And when that's followed up quickly with a second major breach, this one of luxury retailer...
As the evolving healthcare industry faces increasing challenges to keep personal health information protected - including growing volumes of electronic health records, new government regulations, and a more complex IT security landscape - there is a growing need to ensure knowledgeable and credentialed security and...
Editor's Note: Excerpts of this interview appear in ISMG's Security Agenda magazine, distributed at RSA Conference 2014.
Privacy should be built into the design of all healthcare information technology and related processes, says Michelle Dennedy, who's writing a book on the concept of "privacy by design."
A government watchdog plans a variety of activities to scrutinize the data security practices of healthcare providers, including hospitals' security controls over medical devices. It also will take a close look at the HealthCare.gov website.
Where do organizations fail when defining privacy, and how can they best leverage technology to ensure privacy protection? Michelle Dennedy of McAfee and Trevor Hughes of the IAPP share perspectives.
Here's what to expect in the cybersecurity framework, a catalog of tools to be released Feb. 13 that's designed to help critical infrastructure owners develop information security protection programs.
Bipartisanship - a rare commodity on Capitol Hill - manifested itself with the House Homeland Security Committee's approval of a bill aimed to help buttress the cybersecurity of the nation's critical infrastructure.
Six technology companies that sued the government to allow them to disclose secret requests for customer information have made their first revelations under terms of an agreement reached late last month with the government.
They're thought-leaders. Movers and shakers. VIPs and MVPs within their industry sectors. And their actions weigh heavily on how information security is practiced, taught and tested. These are 2014's Influencers.
The breach at Target stores that may have affected as many as 40 million credit and debit card account holders is a watershed moment that could greatly raise awareness of cybersecurity risks, says privacy attorney David Navetta.
Amidst draft legislation and the fallout of large-scale breaches, now is both the best and worst of times for privacy, says Trevor Hughes of the IAPP. What are the best career opportunities for privacy pros?
From access controls to intrusion detection, mobility to privacy, healthcare organizations face unique network security challenges.
This white paper reviews:
Today's unique network security challenges;
How progressive healthcare organizations are tackling these challenges;
Tips for other organizations to...
With information freely available about anyone on the Internet, ISACA's Robert Stroud says security professionals need to better monitor and control how personal information is being accessed and used.
HealthcareInfoSecurity's second annual Top 10 Influencers recognizes leaders playing a critical role in healthcare data security and privacy. Find out who's on the list.
In a speech revealing new limits on the way intelligence agencies collect telephone metadata, President Obama also announced a comprehensive review of how government and business are confronting the challenges inherent in big data.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.