How is the six-hospital Barnabas Health delivery system tackling the challenge of complying with the new HIPAA Omnibus rule? Hussein Syed, director of IT security, explains.
Information sharing within the financial sector has been critical in thwarting cyber-attacks. Legislation pending before Congress would help bridge the information gap among industries, says Paul Smocer of BITS.
Breach notification is just one of the major topics ripe for legislative action in 2013. What are the other key areas of focus? Gain insight from this panel of three security and privacy attorneys.
How can security pros help organizations prevent breaches and data loss? The Online Trust Alliance has released its latest guide to data protection and breach readiness, and OTA founder Craig Spiezle offers tips.
Although suggestions in a new Federal Trade Commission staff report do not have the force of law, they do provide guidance on how the agency could enforce American federal laws and regulations to protect the privacy of users of smart phones and tablets.
Containerization - it's the latest strategy for securing the critical data accessed by remote workers and mobile devices. How is the concept deployed? David Lingenfelter of Fiberlink offers insight.
A Montreal computer science student accessed, without authorization, an IT system to check if a software vulnerability he discovered had been remedied. This case raises the question: When, if ever, is such unauthorized action justified?
"This is a business that should have known better," U.K. Deputy Information Commissioner David Smith says. "There's no doubt in my mind that they had access to both the technical knowledge and the resources to keep this information safe."
The failure to pass privacy legislation in the U.S. hasn't stopped regulatory agencies from taking matters into their own hands - a pattern that will continue throughout 2013, says a panel of attorneys.
To repel the onslaught of cyberattacks against organizations, security leaders are debating the merits of the "hack back" defense. Legal experts discuss the pros and cons of this emerging strategy.
ID theft is a growing global problem. Eva Velasquez, head of the ITRC, outlines how public and private organizations in 2013 can update approaches to ID theft prevention.
With different nations establishing different privacy standards, organizations face adopting the most stringent regulations in order to be compliant everywhere they operate, says Marc Groman, a director of the International Association of Privacy Professionals.
Cloud computing and mobility are areas likely to see new regulatory attention in the year ahead. But what are the other hot topics that leading attorneys believe will be addressed in new legislation worldwide?
How will mobility, evolving threats and legislative trends impact privacy and security professionals in 2013? Intel CISO Malcolm Harkins and McAfee CPO Michelle Dennedy offer their predictions.
"While these two priorities - sharing and safeguarding - are often seen as mutually exclusive, in reality they are mutually reinforcing," President Obama says in the introduction to the strategy.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.