Cyber criminals typically will move on to a target that is much less secure but those behind advanced persistent threats will spend months if not years trying to penetrate an IT system until they succeed, says Dmitri Alperovitch, McAfee Labs threat research vice president.
When the HITECH Act was enacted early in 2009, much was made of its provisions calling for tougher enforcement of the HIPAA privacy and security rules. But we're still waiting for ramped-up enforcement to begin.
Federal agencies have until Jan. 28 to complete an assessment on how they handle confidential information, a process prompted by the WikiLeaks episode that exposed 250,000-plus diplomatic cables in November, says OMB Director Jacob Lew.
Researchers explore adapting geolocation technology to identify where data reside on the cloud so organizations can comply with IT security laws and regulations, RSA Chief Technology Officer Bret Hartman says.
Devising strategies for ensuring social media are not used in ways that violate patient privacy is one of the top trends for 2011, says Lisa Gallagher, senior director of privacy and security at the Healthcare Information and Management Systems Society.