After firing off a letter to Apple Computer CEO Steve Jobs that questions the secret tracking, Sen. Al Franken schedules a May 10 hearing before a Senate Judiciary subcommittee he chairs on protecting mobile privacy.
From mobile devices to social media and cloud computing, IT governance is all about risk management. "You can't de-risk everything, but you can de-risk the majority of circumstances you will see in normal operations," says governance expert Robert Stroud.
Key questions: What impact - if any - will the recent RSA and Epsilon data breaches have on the FFIEC's pending authentication update? And when will this long-awaited banking guidance finally be released?
Physicians who use social media to discuss their work, even without naming patients, risk privacy violations, a recent case in Rhode Island clearly illustrates. The case is an eye-opener for all clinicians about social networking risks.
About the same percentage of respondents cite China as a major source of concern for cyberattack as they did a year ago, a McAfee study reveals. What changed? Concern about the U.S. has declined, says study author Stewart Baker.
It's been over three months since the accidental disclosure. When will the final FFIEC authentication update be released? "I don't think we're any less safe," says Gartner's Avivah Litan. "We just need to step up enforcements."
Gigi Hyland, board member of the National Credit Union Administration, says the latest draft of authentication guidance is awaiting final signoff from just one member agency of the Federal Financial Institutions Examination Council.
The ongoing effort to enable the secure exchange of health information from coast to coast recently got a very important boost when five well-known healthcare organizations joined forces to serve as trailblazers.
U.S. Cyber Challenge will hold a series of competitions aimed primarily at college students as part of its April Cyber Quest series, with winners receiving invitations to attend one of several cyber camps to be offered this summer.
At a time when there is heightened demand for cybersecurity professionals within the U.S. federal government, the value of IT security certifications ranks high as a criterion for hire.
Let's hope the final version of the Federal Health IT Strategic Plan for 2011-2015 contains more details about new privacy and security initiatives than the draft that was recently issued.
A survey of American households - the same one used to determine the national unemployment rate - shows that 37,000 individuals in the United States consider themselves as information security analysts.
From Facebook to Twitter, the new era of business communication and collaboration requires involvement of senior leaders to guide an organization's social media strategy and engagement. It's a big role, and it comes with significant responsibilities.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.