security
See the following -
So Many Android Devices. Too Few Updates.
Only 25 percent of Android handsets have Jelly Bean installed, according to developer.android.com. But nearly ten months after its initial release, shouldn't that adoption figure for Google's latest and most secure Android OS be much higher, especially given all the malware now targeting Androids? Like most things it's complicated. Read More »
- Login to post comments
Some Lessons From a Major Outage
But what when the network goes down – across the country and possibly internationally?With remote hosting of business-critical systems becoming more widespread it’s worth looking at some of the implications of a major outage. Read More »
- Login to post comments
Somebody, Probably Anonymous, Hacked The Fed During The Super Bowl
Two days after Anonymous bragged about its latest government website breach and data dump, the United States Federal Reserve admitted that it had been hacked and robbed. "The Federal Reserve system is aware that information was obtained by exploiting a temporary vulnerability in a website vendor product," a Fed spokesperson told Reuters... Read More »
- Login to post comments
Sonatype Launches Insight Application Health Check
Sonatype, the leader in Component Lifecycle Management (CLM), today announced the launch of Insight Application Health Check, the first easy way to analyze the components that make up an application and the latest service in the Sonatype Insight product suite for ensuring the integrity of open-source components at every phase of the software lifecycle. Read More »
- Login to post comments
Splunk 2013: Top enterprise cyber security 'appalling' - former NSA CIO/CTO
Former National Security Agency (NSA) CIO and CTO Dr Prescott Winter believes that many large organisations don't know what they're doing when it comes to cyber security and as a result defences against hackers and cyber attacks are "appalling". Read More »
- Login to post comments
States’ Hospital Data For Sale Puts Privacy In Jeopardy
Hospitals in the U.S. pledge to keep a patient’s health background confidential. Yet states from Washington to New York are putting privacy at risk by selling records that can be used to link a person’s identity to medical conditions using public information. Read More »
- Login to post comments
StatRad to Participate in 2016 Society for Imaging Informatics in Medicine (SIIM) Annual Meeting
StatRad®, a leading provider of teleradiology services and makers of the rapidly expanding RadConnect® medical image exchange application, will be welcoming clients at the 2016 SIIM meeting in Portland June 29 through July 1, 2016, in booth No. 605. StatRad’s cloud-based medical image exchange continues to gain rapid adoption as shown by the expansion of RadConnect’s national client base by 55 new hospitals and other healthcare facilities in the past 180 days...
- Login to post comments
Study Predicts BYOD Boom By 2016
A recent Telework Week report indicated that bring-your-own-device, or BYOD, programs have yet to fully take hold in the federal government, even though many employees are pressing to use their own smartphones and tablets for work. That may soon change: A new analysis predicts more than one-third of organizations will stop providing devices to workers by 2016. Read More »
- Login to post comments
Success Factors for Open Source Adoption
Long ago, we stopped questioning if open source should be adapted into mission-critical systems, and rather talked about how best to use it. Read More »
- Login to post comments
Successful Hacker Attack Could Cripple U.S. Infrastructure, Experts Say
A report tying the Chinese military to computer attacks against American interests has sent a chill through cyber-security experts, who worry that the very lifelines of the United States — its energy pipelines, its water supply, its banks — are increasingly at risk. Read More »
- Login to post comments
Summary Of “ITdotHealth II” – The 2012 Harvard Health IT Meeting
The following is an overview of the conference, held September 10-11, 2012. In several weeks, we will post a complete executive summary, as well as videos and slide presentations from the event. Read More »
- Login to post comments
Survey: Local, State Gov CIOs Underprepared For Attacks
Only about half of state and local government CIOs polled in a recent survey said they’re prepared for a cyber-attack — even as 28 percent of them reported experiencing a system hacking or attack attempt in the previous year. Read More »
- Login to post comments
Target Breach: Are Pharmacy Records Safe?
Target has not indicated that pharmacy records were exposed, although some say the recent data breach amplifies concerns about “medical identity theft” at retail chains with pharmacies. Read More »
- Login to post comments
Testing 1-2-3: Open-Source Tools To Ensure Quality Applications
When the HealthCare.gov rollout did not quite go according to plan, much was made about the absence of “testing.” There have been myriad newspaper columns, cable talk show segments, even exchanges at congressional hearings dedicated to the topic. Though the attention is gratifying to a software guy like me, implicit in the discussion is the premise that testing is a monolithic activity to be performed once development is complete. Read More »
- Login to post comments
The Belarusian Connection
U.S. intelligence agencies last week urged the Obama administration to check its new healthcare network for malicious software after learning that developers linked to the Belarus government helped produce the website, raising fresh concerns that private data posted by millions of Americans will be compromised. Read More »
- Login to post comments