Some 300,000 clients of the Cord Blood Registry, a stem cell bank, have been notified of a personal information breach involving stolen unencrypted backup tapes.
Mobile banking, social media, cloud computing. These all are part of the global banking landscape today, and with these innovations come new expectations, says Alessandro Moretti of (ISC)2 and UBS Investment Bank.
Speculation about the pending update to online authentication guidance has been circulating around water coolers for months now. "A [disclosure] like this could make it more challenging for the regulators," says attorney David Navetta.
Sheryl Rose, the first chief information security officer at Catholic Health Initiatives, is leading efforts to implement a comprehensive security strategy as the organization rolls out electronic health records.
"It's interesting to see regulators putting the onus on the financial companies for fraud that occurs after the theft has already happened," says David Navetta, co-chairman of the American Bar Association's Information Security Committee.
The co-chair of the Commission on Cybersecurity for the 44th President praises the Obama administration's commitment to IT security, but says the administration has much more work to do to develop a comprehensive strategy to combat cyber threats.
As criteria are developed for the next stages of the HITECH Act electronic health record incentive program, it's essential that privacy and security issues are adequately addressed, one consumer advocacy group stresses.
Homeland Security Secretary Janet Napolitano asks Senate appropriators to increase funds for fiscal year 2012 so the department can identify and reduce vulnerabilities in the nation's key cyber networks.
The U.S. Supreme Court will hear arguments April 26 in a healthcare privacy case involving whether Vermont can ban the use of certain prescription drug data in the marketing of pharmaceuticals.
Describing it as the capstone publication of a partnership with the defense and intelligence communities, NIST publishes new guidance on managing security risk associated with the operation and use of IT systems.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.