security

See the following -

So Many Android Devices. Too Few Updates.

Robert Vamosi | Computerworld | May 28, 2013

Only 25 percent of Android handsets have Jelly Bean installed, according to developer.android.com. But nearly ten months after its initial release, shouldn't that adoption figure for Google's latest and most secure Android OS be much higher, especially given all the malware now targeting Androids?  Like most things it's complicated. Read More »

Some Lessons From a Major Outage

Tony Collins | Campaign4Change | July 31, 2012

But what when the network goes down – across the country and possibly internationally?With remote hosting of business-critical systems becoming more widespread it’s worth looking at some of the implications of a major outage. Read More »

Somebody, Probably Anonymous, Hacked The Fed During The Super Bowl

Adam Clark Estes | The Atlantic Wire | February 5, 2013

Two days after Anonymous bragged about its latest government website breach and data dump, the United States Federal Reserve admitted that it had been hacked and robbed. "The Federal Reserve system is aware that information was obtained by exploiting a temporary vulnerability in a website vendor product," a Fed spokesperson told Reuters... Read More »

Sonatype Launches Insight Application Health Check

Press Release | Sonatype | July 25, 2012

Sonatype, the leader in Component Lifecycle Management (CLM), today announced the launch of Insight Application Health Check, the first easy way to analyze the components that make up an application and the latest service in the Sonatype Insight product suite for ensuring the integrity of open-source components at every phase of the software lifecycle. Read More »

Splunk 2013: Top enterprise cyber security 'appalling' - former NSA CIO/CTO

Danny Palmer | computing.co.uk | October 2, 2013

Former National Security Agency (NSA) CIO and CTO Dr Prescott Winter believes that many large organisations don't know what they're doing when it comes to cyber security and as a result defences against hackers and cyber attacks are "appalling". Read More »

States’ Hospital Data For Sale Puts Privacy In Jeopardy

Jordan Robertson | Bloomberg | June 5, 2013

Hospitals in the U.S. pledge to keep a patient’s health background confidential. Yet states from Washington to New York are putting privacy at risk by selling records that can be used to link a person’s identity to medical conditions using public information. Read More »

StatRad to Participate in 2016 Society for Imaging Informatics in Medicine (SIIM) Annual Meeting

Press Release | StatRad | June 16, 2016

StatRad®, a leading provider of teleradiology services and makers of the rapidly expanding RadConnect® medical image exchange application, will be welcoming clients at the 2016 SIIM meeting in Portland June 29 through July 1, 2016, in booth No. 605. StatRad’s cloud-based medical image exchange continues to gain rapid adoption as shown by the expansion of RadConnect’s national client base by 55 new hospitals and other healthcare facilities in the past 180 days...

Read More »

Study Predicts BYOD Boom By 2016

Brittany Ballenstedt | Nextgov | May 6, 2013

A recent Telework Week report indicated that bring-your-own-device, or BYOD, programs have yet to fully take hold in the federal government, even though many employees are pressing to use their own smartphones and tablets for work. That may soon change: A new analysis predicts more than one-third of organizations will stop providing devices to workers by 2016. Read More »

Success Factors for Open Source Adoption

Claus von Riegen | Open Source Delivers | February 7, 2012

Long ago, we stopped questioning if open source should be adapted into mission-critical systems, and rather talked about how best to use it. Read More »

Successful Hacker Attack Could Cripple U.S. Infrastructure, Experts Say

Erin McClam | NBC News | February 19, 2013

A report tying the Chinese military to computer attacks against American interests has sent a chill through cyber-security experts, who worry that the very lifelines of the United States — its energy pipelines, its water supply, its banks — are increasingly at risk. Read More »

Summary Of “ITdotHealth II” – The 2012 Harvard Health IT Meeting

Staff Writer | SMART Platforms | September 14, 2012

The following is an overview of the conference, held September 10-11, 2012. In several weeks, we will post a complete executive summary, as well as videos and slide presentations from the event. Read More »

Survey: Local, State Gov CIOs Underprepared For Attacks

Anthony Brino | Government Health IT | April 30, 2013

Only about half of state and local government CIOs polled in a recent survey said they’re prepared for a cyber-attack — even as 28 percent of them reported experiencing a system hacking or attack attempt in the previous year. Read More »

Target Breach: Are Pharmacy Records Safe?

Jake Anderson | Twin Cities Business | January 16, 2014

Target has not indicated that pharmacy records were exposed, although some say the recent data breach amplifies concerns about “medical identity theft” at retail chains with pharmacies. Read More »

Testing 1-2-3: Open-Source Tools To Ensure Quality Applications

Neil A. Chaudhuri | GCN | December 10, 2013

When the HealthCare.gov rollout did not quite go according to plan, much was made about the absence of “testing.” There have been myriad newspaper columns, cable talk show segments, even exchanges at congressional hearings dedicated to the topic. Though the attention is gratifying to a software guy like me, implicit in the discussion is the premise that testing is a monolithic activity to be performed once development is complete. Read More »

The Belarusian Connection

Bill Gertz | The Washington Free Beacon | February 3, 2014

U.S. intelligence agencies last week urged the Obama administration to check its new healthcare network for malicious software after learning that developers linked to the Belarus government helped produce the website, raising fresh concerns that private data posted by millions of Americans will be compromised. Read More »