"Raising the security awareness of your workforce is your best defense against having a breach incident," says David Holtzman, who's on the federal team that enforces the HITECH Act breach notification rule.
Plan would nationalize breach notification law, set penalties for cybercrimes and protect businesses from lawsuits that share cybersecurity information with DHS as well as promote the use of cloud computing.
President Obama's proposed federal data breach notification legislation would supersede divergent laws in effect in most states and be enforced by the Federal Trade Commission.
Five leading healthcare organizations are collaborating to demonstrate the secure national exchange of health information, hoping to pave the way for others, says James Walker, M.D. of Geisinger Health System.
U.S. government agencies are eager to gain the service and cost efficiencies of cloud computing, but the Government Information Security Today survey finds they have serious reservations about information security in the cloud.
A batch of overdue regulations dealing with healthcare privacy and security issues will be issued in one "omnibus" rulemaking this year, but how soon remains uncertain, one federal official says.
BITS and the ABA are interested in managing future domains affiliated with bank brands and financial interests. If approved, their domain oversight would allow them to control certain domain names registrations.
A new (ISC)2 information security workforce survey projects the doubling of federal government IT security staffs from 27,000 employees today to more than 61,000 by 2015. What's behind this growth?
"Our ability to provide immediate response to vulnerabilities and threats ... is quickly establishing VA as a model of excellence for the rest of the federal government."
VA CIO Roger Baker says in testimony before a House panel.
A key factor in ensuring that information technology is available in the wake of a disaster is cross-training IT staff to handle multiple roles, says Terrell Herzig, information security officer at UAB Medicine.
When it comes to hot topics, they don't get hotter than authentication, cloud computing and IT governance - all of which I've discussed at length in recent interviews with industry thought-leaders. Let's review some highlights from these conversations.
"No one up here wants to stop Apple or Google from doing the incredible things that you do," Sen. Al Franken says. "What today is about is trying to find a balance between all of those wonderful benefits and the public's right to privacy."
Widely publicized reports aren't giving the full picture of an (ISC)2 survey that projects the doubling of the federal government IT security workforce by 2015.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.