About 4.9 million patients treated in San Antonio area military treatment facilities since 1992 have been affected by a health information breach involving the theft of backup tapes for electronic health records.
The Department of Homeland Security becomes the first federal agency to award a task order using a General Services Administration's blanket purchase agreement for an infrastructure-as-a-service, cloud-computing offering, says GSA Assistant Commissioner Mary Davie.
With the announcement of a breach affecting 4.9 million patients in the Defense Department's TRICARE healthcare program, there have now been five incidents that each affected at least 1 million individuals since the HIPAA breach notification rule took effect.
BITS, the technology policy division of The Financial Services Roundtable, has just named Paul Smocer its new president. What are his strategies for tackling fraud, security and FFIEC compliance?
Melissa Hathaway doubts Congress will enact a cybersecurity law. "I fear we will continue to watch the bills 'sit here and wait, while a few key congressmen sit and debate. It's not easy to become a law," she writes, citing a kid's jingle.
In October, the Department of Veterans Affairs will launch a go-slow approach to enabling physicians and others to use Apple iPhones and iPads for limited purposes.
Discussing Verizon's new report on the state of PCI compliance, PCI expert Jen Mack says payment card security today is "disappointing," and global merchants are at serious risk of new data breaches.
The certificate authority system is flawed. It's like the Wild West, disjointed and unregulated, where no enforcement exists for standardized accountability.
Consumers say convenience outweighs risk when it comes to banking online. And the ABA's Nessa Feddis says online banking is actually more secure than most industry pundits suggest.
In the areas of risk management and business continuity, security professionals have advanced significantly since Sept. 11, 2001. But there's still an issue of complacency that needs to be addressed, says Rolf von Roessing, past international vice president of ISACA.
Hacks are unavoidable; they happen. The challenge is how to handle them once they occur. DigiNotar demonstrates what organizations should not do when a breach is discovered.
Only one of three national breach notification bills that won approval in the Senate Judiciary Committee last week would address a gap in protections for healthcare information, says Harley Geiger of the Center for Democracy & Technology.
Information security poses a major challenge to the widespread adoption of cloud computing, yet the Cloud Security Alliance, an association of cloud stakeholders, sees the cloud as a provider of information security services.
"Forensics in the cloud is not necessarily a new field, but requires a new skill set and being able to learn on the fly," says Rob Lee, curriculum lead for digital forensics at SANS Institute.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.