Designing an effective Information Security Program is a process that requires a thorough knowledge of your assets (what you're protecting) and the threat sources (the type of entity that might try to get it). Understanding these two factors is foundational…
Lots of rules being thrown around these days. Let Redspin lead you though the thicket and tell you what you need to know.
In the most direct way possible, yes, it does. It matters to your reputation, your back pocket and your customers.
While information around this attack and its impact on customers is lacking (RSA is citing an ongoing investigation as a reason to limit public disclosure) a couple of lessons about general security management can be learned.
With so much recent interest in IT security driven by the “meaningful use” incentive program, we want to share some our observations and perspectives from recent Redspin client engagements in the healthcare industry.
HHS OCR has really taken its new role granted by HITECH seriously because they are seeking to tighten regulations and increase financial penalties.
Since the Breach Report 2010 portable media is trending as one of the easiest ways find yourself in a data breach scenario.
Actual security vs. advertised state of security- whats the difference? Apparently enough to get breached.
Nasdaq has acknowledged that suspicious files were found on some of its systems. The files were apparently a result of hackers gaining access to at least one of their servers.
Web applications are becoming an increasingly big part of healthcare. Because of this is is widening the target for hackers.