The firing of a hospital staff member who inappropriately accessed former Penn State football coach Joe Paterno's records sends a strong signal about the importance of protecting patient privacy.
Dice.com reports a 79 percent increase in the total number of information security jobs posted to its site. What are the five hottest career prospects for aspiring pros?
Healthcare organizations should carefully document all necessary breach investigation and notification actions and responsibilities to avoid chaos when an incident occurs, says Dawn Morgenstern, privacy official at the Walgreens national drugstore chain.
2011 has offered quite a number of tough lessons for security professionals. Here at (ISC)2, where security education is our focus, the close of another year raises the old teacher's question: "What have we learned, class?"
New York's Pace University has just announced its new Seidenberg Cyber Security Institute. What is the school's mission, and why is now the ideal time to open its doors to career-minded students?
It's one thing to have a data breach response team. It's quite another to ensure that team is made up of savvy personnel, says Brian Dean, a former privacy executive for KeyBank.
A proposed cybersecurity workforce framework by NICE can serve as a helpful tool for organizations that may need assistance deciding what competencies are relevant for their enterprise.
What are the top 5 information security certifications for 2012? The answer might not surprise you, but the rationale behind it might. Hint: Employers now seek more than just technical proficiency.
Physician group practices, many of which are adopting their first electronic health record system, need to make staff training on privacy and security issues a top priority, says Susan Turney, M.D., the new CEO at the Medical Group Management Association.
None of the agencies surveyed by GAO could precisely enumerate the number of IT security personnel they employed. In fact, estimates within agencies varied widely, based on who was reporting and analyzing employment data.
Dan Waddell of Tantus Technologies says giving back to the community is every information security professional's responsibility. And with the insurgence of cybercrime affecting all walks of life, now is the ideal time to get started.
Information security threats - especially to critical infrastructures and from nation-states - are evolving. But security education curricula are struggling to keep pace, according to Eugene Spafford, renowned information security professor at Purdue University.
Congress reacts to an April inspector general report, which revealed that 36 percent of interviewed FBI field agents assigned to cyber investigations admit they lacked the expertise to investigate cyberintrusions.
To win support for information security spending, IT security professionals need to refine how they make their case to senior executives, says Christopher Paidhrin, security compliance officer at PeaceHealth Southwest Medical Center. Here's how.
Most organizations remain uncomfortable in letting their employees use their own mobile devices to access their IT systems. Yet, in many instances, those charged with securing their enterprises' IT understand that it's just a matter of time before they must grant workers permission to employ those devices.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.