The Pentagon takes 81 months to field a new computer system; Apple Computer spent 24 months to develop the iPhone. Deputy Defense Secretary William Lynn tells RSA 2011 the DoD wants to be more like Apple.
Sen. Al Franken, D-Minn., will head a new subcommittee on privacy, technology and the law, said Sen. Patrick Leahy, D-Vt., who chairs the Senate Judiciary Committee.
Many of those testifying at a hearing about a presidential council's call for a universal exchange language Tuesday urged a go-slow, deliberative approach to the effort to improve the interoperability of electronic health records while maintaining privacy.
HealthcareInfoSecurity.com will provide in-depth coverage of privacy and security issues at the Healthcare Information and Management Systems Society Conference next week.
Known as the Cloud First policy, Federal CIO Vivek Kundra has outlined a new policy in which one-quarter of the $80 billion the federal government spends on information technology would employ cloud computing solutions.
Implementing electronic health records software that includes security functions is just the first of many steps involved in ensuring security, says Bonnie Cassidy, president of the American Health Information Management Association.
Regulators are sending a message to U.S. banking institutions: AML practices and due diligence, especially when dealing with foreign customers and correspondents, must be priorities.
Some 1.7 million individuals are being notified of a health information breach incident involving data from The New York City Health and Hospitals Corp. It's the largest breach reported so far under the HITECH Act breach notification rule.
Attracting and retaining IT security professionals may be the No. 1 staffing challenge states face, but the numbers alone unveiled in a recent National Association of State Chief Information Officers survey don't tell the whole story.
Hussein Syed, director of IT security at Saint Barnabas Healthcare System, explains why the organization shifted from software-based to hardware-based encryption.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.