The dotted lines of health care
Health care chief information security officers (CISOs) have to ask themselves, “What exactly are the security and privacy requirements around EHR?”
Health care chief information security officers (CISOs) have to ask themselves, “What exactly are the security and privacy requirements around EHR?”
Large vendors are bundling major components of information security into their stack offerings, says TheInfoPro’s
Ken Male.
One of the findings in SC Magazine’s fourth annual “Guarding Against a Data Breach” survey is that you can get compliant with a sound security program in place, but you might not necessarily get security with a compliance-based plan.
The winners of the prestigious 2011 SC Awards U.S. will be announced on Tuesday, Feb. 15 in San Francisco.
Our two gatherings – the third annual SC World Congress in New York and inaugural SC Congress Canada in Toronto – illustrated the vitality of the security industry.
Some say that the United States, compared to Europe and Canada, long has lagged in terms of privacy controls for consumers, but stricter regulations could in the offing.
SC Magazine’s annual data breach survey shows that budgets will remain stagnant as threats continue to evolve.
Today’s complex threat landscape must give rise to fresh security ideas, and the U.S. Department of Homeland Security’s Advanced Research Projects Agency is helping to empower them.
This product is from a brand new company and I predict big things for it if the management team continues down the road they’re on now.
We kick off the year with strong authentication as our theme. That includes multifactor and biometric authentication.