How to embrace a continuous compliance approach for HIPAA

HIPAA

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • TJX should have had stronger Wi-Fi encryption, say Canadian officials

    TJX Cos. should have moved faster to upgrade its Wi-Fi security from WEP encryption to WPA encryption, say Canadian officials. 

  • Report: Companies still stumped by PCI DSS

    A VeriSign review of PCI Data Security Standard (PCI DSS) assessments it conducted found that more than half were still stumbling on the path to compliance. 

  • No good way to measure HIPAA compliance

    It's been two years since HIPAA took effect. But for many IT pros in the healthcare sector, measuring actual compliance is still a tricky task. 

  • Perfect HIPAA security impossible, experts say

    Two years after HIPAA security rules took effect, IT pros in the healthcare sector have found that constant security improvements are necessary for compliance. 

  • PCI compliance costs often underestimated, study finds

    Companies are moving forward with PCI DSS projects, but many are underestimating the costs associated with compliance. 

  • ISO 27001 could bridge the regulatory divide, expert says

    Karen Worstell, former CISO at Microsoft and AT&T Wireless, recently joined the advisory board of Neupart A/S, a five-year-old European security risk management and awareness firm that just launched a North American office in the Seattle area. The co... 

  • A new awareness for SIMs

    Experts say the use of security information and event management systems can not only give organizations overall visibility into their network security and improve their incident response, but also meet compliance demands. 

  • Where hard drives go to die, or do they?

    A number of enterprises are using asset disposal firms to ensure sensitive corporate data is destroyed, but the process is hardly foolproof. In fact, a convicted felon could have his hands on your data right now. 

  • Dirty documents cause messy security situations

    What use are firewalls and intrusion prevention systems if insecure digital documents reveal all of an enterprise's best-kept secrets? That's the question many security experts are asking in the wake of several high-profile incidents in which organiz... 

  • CSOs seek regulatory sanity in 2006

    IT security officers long for a common system to comply with laws that are similar, but often have conflicting demands. Some say a single set of federal guidelines could help, but others fear the implications.