The privacy profession is evolving rapidly, and security leaders increasingly need to understand the unique demands and responsibilities that come with protecting privacy. But where do they gain this insight?
Jan. 5 is the deadline for participation in the fourth annual Healthcare Information Security Today survey, designed to examine the privacy and security priorities and challenges of healthcare organizations of all sizes.
HealthcareInfoSecurity launches its fourth annual survey to measure progress toward ensuring the privacy and security of healthcare information as more records are digitized and shared, and as more cyberthreats emerge.
As mobile threats have evolved, so has mobile security. What used to be the benchmark - mobile device management - today is merely the baseline. While organizations today develop mobile security maturity, they enhance not just device security, but also content, application and transaction security. Where does your...
It's time to consider amending the HIPAA Privacy Rule to enable the sharing of certain research data, without patients' authorization, to help improve the quality of care, contends Douglas Fridsma, M.D., a former federal health IT leader.
A new U.K. government report accuses social networks of serving as a "safe haven for terrorists," inflaming what some see as tense relations in the post-Snowden era between the British government and Silicon Valley.
The market for IT VRM software exists to enable the assessment, monitoring and remediation of risks arising from the use of IT vendors and IT service providers. Gartner's first Magic Quadrant on this small but growing market evaluates 10 vendors to help you in your vendor evaluation process.
Download this white...
Legal experts are analyzing the potential national impact of a Connecticut Supreme Court ruling that plaintiffs can sue for negligence if a healthcare provider violates HIPAA regulations for protecting patient privacy.
Until we get to a stage where we can guarantee the confidentiality of traditional identity reference data such as names, addresses, emails and favorite cat colors, we must move away from relying on this static data for authentication. Truly massive amounts of this information are stolen on a regular basis, proving we...
Apps for wearable devices that are designed to track a user's pulse rate, blood-oxygen level or location may be leaking that data during transmission, Symantec security researcher Candid WÃ¼eest warns in a Black Hat Europe briefing.
A federal advisory workgroup that makes privacy and security recommendations to the the Office of the National Coordinator for Health IT has officially re-launched with a new name, new members and several new hot topics to tackle in the coming months.