Health care entities need clear guidance on analyzing risk for meaningful use

There is but a single measure related to security and privacy in the “meaningful use” rules that will be used to determine the eligibility of health care providers to qualify for incentive payments for the adoption…

Recommended reading: clear analytical insights in a cluttered sea

With all the attention focused on privacy and security these days, any significant development or incident gets tremendous online coverage. This is at one a good thing and a terrible problem. We’ve noted before the difficulties…

Senate sees exponential rise in computer attacks, might be time to rethink security posture, not just spend more to respond

In comments justifying a requested $15 million operating budget increase for fiscal 2011, the Senate Sergeant-at-Arms stressed the need to improve computer security in the face of an extraordinary rise in security “events,” which reported went…

Is the recent focus on the “cyberwar” intended to build support for more government monitoring?

Homeland Security secretary Janet Napolitano emphasized in her keynote speech at the RSA conference last week the need for greater collaboration between the government and private sector in order to effectively address cybersecurity challenges facing the…

Hacking of high school grading system raises key security practice issues

Although it is one of the top-ranked schools in high-performing Montgomery County, Maryland, in the past few months Winston Churchill High School has been more noteworthy for the alleged hacking by students into the school’s grade…

Microsoft working with German government to implement claims-based ID cards

While promoting the release of its Forefront Identity Manager product set during this week’s RSA conference in San Francisco, Microsoft announced its support for a prototype national ID card system in Germany that is designed to…

Read-only computer security hardware device claims to be hack-proof

Despite the dismissal-as-foolishness that such claims often bring, security start-up vendor InZero Systems is marketing a sort of hardware proxy device that it claims is hackproof. As featured in an article in the March 8, 2010…