When the Commonwealth of Pennsylvania suffered a major security breach a few years back, vulnerabilities in a Web application were to blame. CISO Erik Avakian explains how the state developed a process to correct flaws in application code.
The American Health Information Management Association plans to work with various states next year to move toward more uniform privacy and security requirements that are in synch with federal requirements, says Lynne Thomas Gordon, AHIMA's new CEO.
It's not a question of if employees will bring their own mobile devices to work and connect to your systems. It's a matter of when. But the benefits of BYOD outweigh the risks, says Malcolm Harkins, CISO of Intel.
Breaches have an adverse impact on the fundamental operations of a business or government and without fully understanding that, executives and managers cannot smartly run their operations successfully.
The scheme allegedly involved insiders recruited by fraudsters to steal information about more than 200 individuals and organizations. How can institutions improve background screening and prevent fraud?