Network World

Network World
Share

Network World

 •  November 16, 2015

Regulations themselves are already sufficient. FISMA, HIPAA, NERC CIP, PCI, COBIT and others already require controls over who can access the systems and data and the proper termination of access when no longer needed. However, implementation and audit ...

Network World

 •  October 28, 2015

Yet with major breaches at health care providers this year ... a customer’s network detects cyber threat information? Can it share the information and be protected from liability? “I don’t think the issue is squarely addressed in the bill ...

Network World

 •  October 15, 2015

... that describes data formats and APIs for exchanging electronic health records to enable healthcare companies to securely share data with each other and mobile apps and meet certification guidelines set by the U.S. government. As such, FHIR is going to ...

Network World

 •  October 6, 2015

Trend Micro's new cybersecurity report says most breaches are actually caused by device loss, rather than malware or hacki

Network World

 •  October 5, 2015

It is the direct connection that counts. To achieve this level of connection, Tamasi has tried to embrace video “telehealth” solutions where doctors can interact with patients using video solutions in the fixed meeting spaces in various facilities.