Key government security initiatives making slower than anticipated progress

The Government Accountability Office released two reports, completed in March and released publicly on Monday, that highlight slower-than-expected progress being made on key government-wide information security initiatives. The first report focuses on the Federal Desktop Core…

Public-private sector debate on health IT turns to whose security is weakest

Security concerns remain a major sticking point on electronic health records, health IT in general, and greater levels of health information exchange and interoperability among potential public and private sector participants in those exchanges. An article…

Feds appear committed to cloud computing; potential cost savings outweight security concerns

Federal Chief Information Officer Vivek Kundra stressed his belief that the federal government needs to get out of the business of building data centers and managing IT infrastructure, hardware, servers, and application software, and instead should…

As cloud computing gains momentum, so does government attention to privacy and security

While still marked by more hype than tangible success, cloud computing remains an area widely viewed as inevitable in both commercial and public sector markets. Whether you accept the predictions of cloud service vendors or favor…

Better access restrictions needed for medical information

A fair amount of attention is appropriately being focused on the need to maintain appropriate access controls on electronic health record systems and other sources containing personal health information. Among the HIPAA privacy provisions that were…

FTC settlement with Dave & Buster’s shows broad range of security failures

In a notice published yesterday, the Federal Trade Commission (FTC) announced the terms of a settlement to which entertainment chain Dave & Buster’s agreed stemming from FTC charges that the company failed to adequately protect customer…

How much security is enough and, is the answer the same in a courtroom?

One of the recurring questions in information security management is how much security is “enough”? For organizations that have adopted risk-based approaches to information assurance, the level of security protection they put in place is directly…