The firing of a hospital staff member who inappropriately accessed former Penn State football coach Joe Paterno's records sends a strong signal about the importance of protecting patient privacy.
Draft legislation establishing a public-private sector National Information Sharing Organization received generally favorable reviews from a panel of witnesses testifying before a House panel.
The draft legislation would have the Department of Homeland Security conduct risk assessments on critical national IT systems and lead efforts to adopt use of new technologies and practices to keep pace with emerging cyberthreats.
Understanding the definition is merely the beginning. Helping determine the role government should have over the critical infrastructure is something that shouldn't be left solely to lawmakers.
A new, free HIPAA Security Rule Toolkit is designed to help healthcare organizations conduct a thorough risk assessment, says Kevin Stine, who helped guide the project for the National Institute of Standards and Technology.
Legislation to give the federal government authority to share classified cyber-threat information with approved American companies was introduced in the Congress by the chairman and ranking member of the House Intelligence Committee.
The National Institute of Standards and Technology is offering a free online HIPAA Security Rule Toolkit, a self-assessment tool that's designed to help healthcare organizations and their business associates comply with the rule.
In addition to the negative publicity associated with being included on the federal tally of major health information breaches, some organizations are experiencing yet another impact of breaches: class action lawsuits.
Congress reacts to an April inspector general report, which revealed that 36 percent of interviewed FBI field agents assigned to cyber investigations admit they lacked the expertise to investigate cyberintrusions.
It's a new wave of cybercriminal behind the latest major data breaches, says breach expert Lucy Thomson. And these incidents are resulting in a new generation of breach notification laws globally.
Jacob Olcott says Congress' failure to enact comprehensive cybersecurity legislation over the past half decade doesn't mean lawmakers haven't influenced IT security policy.
Layered security is one of the core tenets of the new FFIEC Authentication Guidance - and it's perhaps the most effective strategy for detecting and preventing banking fraud schemes. But what are some of today's most mature approaches to layered security, and how are banking institutions employing them
to detect and...
Too many of today's firewalls are out of date and opening organizations to unacceptable business risks, says Chris King of Palo Alto Networks.
So, how do we quickly get to the next-generation firewall - and what are the key qualities it will need to embrace?
In an interview about the future of firewalls, King...
Senate Majority Leader Harry Reid, in a letter, informed Minority Leader Mitch McConnell of his decision to bring cybersecurity legislation to the floor during the first work period of 2012 legislative session.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.