Health information exchange (HIE) - the electronic movement of health-related information among organizations according to nationally recognized standards - has the potential to transform nearly every aspect of healthcare delivery in this country. Recent policies have helped fund major growth in the world of...
A comprehensive bill to dramatically change the way the federal government addresses cybersecurity could pass the Senate as early as this summer, Sen. Thomas Carper, who chairs a Senate panel with IT security oversight, says in an interview with GovInfoSecurity.com.
Phishy HTML pages get past spam filters, and users of RSA's SecurID two-factor authentication products come up with new ways to monitor threats and take preventive steps in the aftermath of a hacker attack against RSA.
Phishy HTML pages get past spam filters, and users of RSA's SecurID two-factor authentication products come up with new ways to monitor threats and take preventive steps in the aftermath of a hacker attack against RSA.
Mobile devices have forced a radical shift in the way organizations service their customers. Financial institutions are no exception to the pressure of extending their online services to the mobile channel. By 2015 mobile banking could reach one in five adults in the United States. But the growth in mobile devices has...
Hackers target RSA's SecurID products, leading federal IT policymakers question America's preparedness for cyberattacks, new House bill would reform federal IT security governance and why Ohio state government decided to standardize on NIST IT security framework.
"Persistent" is the operative word about the advanced persistent threat that has struck RSA and its SecurID products. "If the bad guys out there want to get to someone ... they can," says David Navetta of the Information Law Group.
All organizations - including federal agencies - must leverage technologies that exist today to secure online transaction systems for E-Gov. Until now, fragmented silos of security technologies have been used to protect individual applications, data, or users. In a world of Webconnected smart phones and interactive...
Australia's government agencies can learn a lot from the nation's banks, when it comes to risk management and protecting privacy, says Graham Ingram, General Manager of the Australian Computer Emergency Response Team. "There are too many people in government organisations who are in denial [of risks]," he says.
Cobit, ITIL, ISO, NIST, an alphabet soup of standards governments often rely on to assure the safety of their IT systems. Ohio government IT leaders saw standardizing on one framework to be a more efficient way to help safeguard IT.
This week's report focuses on one story: Senate WikiLeaks hearing, in which administration officials explained how the WikiLeaks episode occurred and what's being done to prevent such a breach from occurring again.
Pay-at-the-pump card skimming is back, just in time for spring break; and Editorial Director Tom Field shares thoughts from Phoenix about BAI's recent Payments Connect conference.
Pay-at-the-pump card skimming is back, just in time for spring break; and Editorial Director Tom Field shares thoughts from Phoenix about BAI's recent Payments Connect conference.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.