Researchers explore adapting geolocation technology to identify where data reside on the cloud so organizations can comply with IT security laws and regulations, RSA Chief Technology Officer Bret Hartman says.
Dmitri Alperovitch, McAfee Labs threat research vice president, discusses the company's annual threat predictions, saying: "We are seeing an escalating threat landscape in 2011."
Devising strategies for ensuring social media are not used in ways that violate patient privacy is one of the top trends for 2011, says Lisa Gallagher, senior director of privacy and security at the Healthcare Information and Management Systems Society.
Unfettered access to state data "is the kind of stuff that causes me to lose sleep at night," Delaware CSO Elayne Starkey says, in explaining new, stringent rules to let employees use their own smart phones to access state networks.
To help agencies secure their wireless networks and technologies, the Government Accountability Office came up with eight leading practices. For now, GAO says, wireless networks remain at an increased vulnerability to attack.
As healthcare organizations make broader use of wireless networks and devices, they must develop an aggressive risk management plan to address security threats, says security expert Rebecca Herold.
As hospitals and clinics develop strategies for complying with the privacy and security provisions of the HITECH Act and HIPAA, they must be careful not to overlook the additional risks involved in using wireless technologies.
As healthcare organizations make broader use of wireless networks and devices, they must develop an aggressive risk management plan to address security threats, says security expert Rebecca Herold.
Robert Siciliano, a McAfee security consultant and founder of IDTheftSecurity.com, says socially engineered scams that are SMS/text-based will create big headaches for banks and credit unions in the near future.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.