Privacy & Security
The company continued its shopping spree on Friday, scooping up another security-centric vendor, in hopes of moving into healthcare and other regulated vertical markets.
Plaintiffs who slapped Sony Pictures with a class action lawsuit after their detailed medical records were swiped in a cyberattack have finally reached an agreement on a proposed settlement.
A job listing for a small but growing team to create a large distributed security services has Microsoft watchers speculating about the company's intentions.
Healthcare security folks, listen up: Failing to encrypt portable devices and laptops containing patient data could result in a serious HIPAA fine, as one Indiana-based health group can now attest.
Data security isn't what it used to be. With today's threat landscape, the stereotypically introverted, more-into-computers-than-people techie isn't going to cut it as CISO. And there are plenty of people who will tell you why.
Here's a tall task: overseeing identity access management for a 163-hospital health system that spans 20 states and the U.K. But despite the myriad challenges, HCA's Bobby Stokes is ahead of the game. He has a few tips.
Hospital chief information security officers and chief information officers speak very different languages and use very different tools. That can cause friction. But one CISO shows how to "meet in the middle" and "unite against that common enemy."
When it comes to protecting your organization's data, no one has all the answers, and going it alone can be a recipe for disaster.
Jigar Kadakia knows a little something about data security. As CISO of Partners HealthCare in Boston, he leads a security team of more than 40 people responsible for keeping the health system well buttoned up. We talked with Kadakia about his approach to glean some ideas that might be useful to other health systems and hospitals big and small.
A health system based in Kentucky has added security muscle targeted at its network-connected medical devices by rolling out technology that monitors the devices for cyber vulnerabilities.