On the morning of Sept. 11, 2001, federal IT leader Mark Forman was briefing government chief human resources directors on the president's e-government initiative at a forum at the University of Maryland, a 10-mile drive from his White House office, when word came of the first jet crashing into the north tower of the...
As we approach the 10-year anniversary of the 9/11 attacks on the U.S., Kevin Sullivan, a former investigator with the New York State Police, reflects on lessons learned and steps industries still need to take to ensure a tragedy like 9/11 is never repeated.
If you feel strongly about the need to protect the privacy of patient information that's used to support research, you've got some extra time to submit your ideas to federal regulators.
Although those in the field understand very well that the CFPB will have an enormous impact on privacy policy-making responsibilities, questions remain about what the agency will actually do.
Whether you're preparing for the upcoming HIPAA compliance audits, pondering a move to cloud computing or developing a social media policy, it pays to get privacy and security tips from experts in the field.
Are executives spending too much time and energy focused on external hacks, sacrificing attention they should be paying to internal threats? It's good that business leaders understand insiders pose risks, but are they taking those risks as seriously as they should?
Many disaster-related attacks are personal and direct, perpetrated through a phone call. But some take traditional routes, such as e-mail, while more are taking emerging routes, like text messages to mobile devices.
A repentant SparkyBlaze wants to go legit, leaving behind the hacktivism he helped foster as a member of Anonymous and start a career in the U.S. as a ethical hacker. As proof, he's offering advice to protect IT from hackers.
As the Department of Veterans Affairs moves forward with plans to allow physicians and others to use Apple's iPads and iPhones, its CIO has scrapped his laptop for a tablet.
IT systems operated by governments, hospitals, financial institutions and other businesses averted catastrophe, for the most part, as Hurricane and then Tropical Storm Irene stormed through the Eastern seaboard over the weekend.
The Finnish security provider F-Secure concludes the attack e-mail doesn't look too complicated. In fact, it's very simple. But the exploit inside Excel was a zero-day attack at the time and RSA couldn't have protected against it by patching its systems.
Preliminary results of our inaugural Healthcare Information Security Today survey, which is still open for participation, show that only about half of healthcare organizations have a plan in place to comply with the HITECH Act breach notification rule.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.