It takes vigilance, resources and effort to ensure that protected health information is secured on all devices where it resides. Organizations must create a complete inventory of all devices containing PHI, and then implement all necessary steps to ensure it stays secure, no matter where it's stored. In this session,...
Everyone knows Apple refused to comply with a court order to assist the FBI in bypassing security features built into an iPhone that was issued to a San Bernardino shooter. The Justice Department then dramatically said it found another way to access the iPhone, thus deferring crucial underlying questions, which have...
We've all heard about Apple's refusal to comply with a court order to assist the FBI in bypassing security features built into an iPhone that was issued to a San Bernardino shooter. The resulting debate - and the implications for law enforcement, national security, privacy and personal freedom - have led to serious,...
The security of Internet-connected toys is in the limelight after toymaker VTech acknowledged suffering a data breach that affects 5 million accounts and personal information and photographs relating to more than 200,000 children.
Akamai's John Ellis talks about the quick evolution of bots and botnets, and how enterprise security leaders should deal with them now using a three-pronged approach - detection, management and mitigation.
Healthcare CIOs are lobbying for the creation of a unique national patient identifier to facilitate secure national health information exchange. Leslie Krigstein of the College of Healthcare Information Management Executives explains the initiative.
The lead cybersecurity official for Britain's GCHQ intelligence agency dismisses charges that the U.K. conducts mass surveillance. But critics question the government's introduction of the Investigatory Powers Bill.
Some healthcare associations are seeking more clarity from federal regulators about security and privacy requirements proposed for Stage 3 of the HITECH Act "meaningful use" incentive program for electronic health records. Find out their concerns.
An amended version of the 21st Century Cure bill has passed its first Congressional hurdle without revisions to provisions that would significantly change the HIPAA Privacy Rule. The bill also would set penalties for blocking information sharing.
Some privacy experts are concerned that a proposed "21st Century Cures" bill would weaken HIPAA privacy protections for patient data. The measure is designed to help speed up the development of new drugs and treatments.
The privacy profession is evolving rapidly, and security leaders increasingly need to understand the unique demands and responsibilities that come with protecting privacy. But where do they gain this insight?
Jan. 5 is the deadline for participation in the fourth annual Healthcare Information Security Today survey, designed to examine the privacy and security priorities and challenges of healthcare organizations of all sizes.
HealthcareInfoSecurity launches its fourth annual survey to measure progress toward ensuring the privacy and security of healthcare information as more records are digitized and shared, and as more cyberthreats emerge.