Archive
By Page:
By Month:
By Category:
By Post:
- After 11 years, FedRAMP is now the law
- SolarWinds compromise focuses new attention on trust in vendor supply chain
- Repeal of planned FCC privacy rules leave ISPs largely unregulated
- Tax season means it’s time to watch out for W-2 scams
- European Court of Justice rules against UK on data retention
- After Yahoo! breach, can users do anything to protect their online data?
- Delta and other air carriers show how not to do disaster recovery
- It’s hardly treason, but Trump’s call for Russian hacking still encourages illegal actions
- FedRAMP not delivering on promise of standard authorization
- FDIC data breaches indicate systemic failures in security management and monitoring
- Epic Mossack Fonseca breach tied to basic patch management failures
- MedStar attack apparently enabled by unpatched software
- OPM (finally) notifies people affected by breach
- What’s the harm in inaccurate personal information?
- Hopes for better privacy protection in CISA depend on conference committee reconciliation
- European Court ruling invalidates Safe Harbor
- T-Mobile customers suffer breach because company relied on Experian
- Retiring an email server with sensitive data on it? Learn some lessons from Clinton
- Want to reduce unauthorized login attempts? Use Google Authenticator
- It’s (past) time for two-factor authentication
- 4th Circuit rules that obtaining cell site location data requires a warrant
- Threat of phishing attacks shows no signs of diminishing
- WordPress security essentials
- No upside to OPM data breaches
- Subpoena? Court order? Search warrant? How the government can get your data
- 11th Circuit court says no warrant needed for cell site location data
- Lawsuit for improper access to medical records faces many challenges
- Cyber insurance transfers risk but doesn’t replace due care
- Installing Snort on Windows
- Is Clinton’s use of a private email server a big deal or not?
- Feds seek centralized threat analysis with CTIIC
- Anthem breach enabled by compromising administrator credentials
- VMware exec Tony Scott named new Federal CIO
- HealthCare.gov shares consumer data with lots of third parties
- Changes coming for federal infosec managers
- Newly arriving from DHS: binding operational directives
- FISMA 2014 codifies many current federal security practices
- Three years in, FedRAMP offers 3 paths to compliance
- NIST updates security control assessment procedures
- Update to FISMA signed into law
- Home Depot breach shows vulnerability of external vendors
- Operational security lessons from the Target breach
- Microsoft Azure Cloud receives FedRAMP provisional authorization
- Two Amazon Web Services environments attain FedRAMP compliance
- NIST releases 800-53 revision 4
- Tracking source of South Korean cyber attack illustrates challenges for U.S.
- Weaknesses in Census Bureau security symptomatic of poor information security program
- Executive action on critical infrastructure protection renews debate on privacy and information sharing
- First cloud service provider authorized under FedRAMP
- Supreme Court rules unanimously that GPS tracking of suspects requires a warrant
- OMB outlines approach for cloud computing security
- TRICARE data breach shows (again) why encryption of removable media is essential
- Supreme Court will hear case on GPS tracking, warrants, and the 4th Amendment
- VA decision to allow iPad use without FIPS certification provides good example of risk-based decsion making
- HIPAA “access report” potentially much simpler to implement, more valuable than accounting of disclosures
- HHS releases new draft accounting of disclosure rules
- Proposed amendments to ECPA would restrict disclosure of geolocation data
- Privacy and Security Tiger Team recommends federal PKI cross-certification for all NwHIN participants
- Canadian court finds privacy protections apply to personal data stored on employer-owned computer
- Supreme Court ruling on contractor background checks includes internal debate on privacy rights
- Mistaken assumptions about authorized users constrains the trustworthiness of information systems
- More lessons to be learned from WikiLeaks on information sharing, access control, and trust
- Healthcare entities leary of new government policy extending beyond HIPAA
- Consider risks, business impact when making tradeoffs between security and productivity
- Using cellphone GPS tracking, family helps police catch man who robbed them
- VA over-disclosure of EHR data highlights difficulty in managing fine-grained consent
- Trust enables, but is not required for, both cooperation and collaboration
- Decisions to trust others are both personal and subjective
- When does technical competence trump historical performance
- Illustrating different applications of the concept of trust
- Rewarding processing speed at the expense of accuracy is a failure of risk managment
- Evaluating technical tools and services as an exercise in trust
- Lots of health data breaches reported to HHS, only trivial ones to FTC
- Rules still pending on privacy and security requirements for PHRs
- NCHICA offers recommendations to health care providers on security and meaningful use
- Six weeks away from Cyberscope deadline, many agencies remain unclear on requirements
- Anakam aquisition creates potential for online ID proofing and authentication
- Conflicting rulings leave open debate on privacy protections for social network data
- Supreme Court to hear corporate challenge to FOIA based on “personal” privacy
- Identity theft from hospital records violates more than HIPAA
- Health data privacy remains a key factor in slower U.S. adoption of EHRs
- Questions to consider about GPS data, location tracking, and privacy expectations
- Can GPS be used to track your movements, without a warrant? That depends…
- Trustworthy organizations do what they should even in the absence of legal enforcement
- ACLU mounts legal challenge to border searches of electronic devices
- Practical challenges to worthwhile intentions for training more security professionals
- Congressionally legislated privacy may not consider benefits of information sharing
- Major cloud computing privacy legal issues remain unresolved
- Proposed SEC rule on asset-backed securities calls for troubling amount of personal information disclosure
- Seattle public schools extend off-campus speech policies to online activity
- Court rules that continuous GPS monitoring infringes on reasonable expectations of privacy
- The right to sue remains an important element of contract-based governance models
- Despite emphasis on risk analysis, health IT security won’t change much under meaningful use
- Public trust in health IT as a case study in system trust
- Airline use of personal data on passengers likely not constrained by Privacy Act
- HHS withdraws final health data breach notification rule for revision
- Google Apps for Government receives federal authorization to operate from GSA
- Health IT policy intensifies focus on consent
- Significant work remains to produce standards and rules on accounting of disclosures for PHI
- Wisconsin court ruling addresses a different aspect of privacy and personal e-mails