"Matching an implementation to the cloud definition can assist in evaluating the security properties of the cloud," says computer scientist Peter Mell, author of The NIST Definition of Cloud Computing.
Roger Baker, CIO at the VA, says desktop computers will eventually phase out, as mobile devices become predominant channels for communication and work. That evolution has made plans for ongoing mobile security a priority for organizations that cross every business sector.
The total number of Americans affected by major health information breaches since the HIPAA breach notification rule took effect could grow by more than 50 percent once two major recent incidents are added to the official federal tally.
Chief Risk Officer is one of the emerging roles in global business. But what does it take to succeed? "You have to go through the school of hard knocks -- have experience and have made mistakes along the way," says Kevin Blakely, CRO at Huntington Bank.
A new federal rule setting the final guidelines for Accountable Care Organizations under federal healthcare reform gives patients the opportunity to veto the sharing of their Medicare claims data with ACOs.
The BlackBerry disruption strikes at a core IT security precept: availability. Yet, as cybersecurity and IT architecture practitioner Winn Schwartau points out, it also raises the less-often talked about proposition of accountability.
What fraud and security issues does Paul Smocer, the new president of BITS, see as being top concerns in the coming year? Mobile payments, social media, and a strong need for institutions and organizations to comply with existing guidance top the list.
Instead of sabotage, as Stuxnet was used on Iranian nuclear centrifuges, Duqu is designed to gather intelligence that could help attackers mount a future digital assault on industrial control facilities.