Tag: "security"

0
Department of Energy corporation violates Atomic Energy Act

Department of Energy corporation violates Atomic Energy Act

Report: Government violated laws to prop up struggling U.S. uranium enrichment firm USEC Source: washingtonpost.com Author: Steven Mufson The Energy Department, in an effort to prop up a troubled uranium enrichment company, arranged for uranium transfers that failed to comply with laws about fair pricing, national security determinations and limits to prevent the department from […]

0
Prosecuting Leaks – An in-depth discussion of the Pros and Cons

Prosecuting Leaks – An in-depth discussion of the Pros and Cons

Why It Shouldn’t Be Criminal to Report Government Secrets Source: theatlantic.com Author: Conor Friedersdorf Prosecuting journalists imposes huge costs, yields scant benefits, and is mostly pointless in an era when anyone can reach a mass audience. Should the government be permitted to prosecute journalists for revealing classified information? Damon Linker of The Week has joined […]

0
Risks and Threats to Patient Information / EMR

Risks and Threats to Patient Information / EMR

Criminal Attacks on Healthcare Organizations Increase 100 Percent As millions of new patients enter the U.S. healthcare system under the Affordable Care Act, patient records have become a smorgasbord for criminals. The Fourth Annual Benchmark Study on Patient Privacy and Data Security by Ponemon Institute, sponsored by ID Experts®, reveals new security and privacy threats […]

0
2015 Fed Budget – Summary by Agency

2015 Fed Budget – Summary by Agency

Summary of President Obama’s $3.9 trillion budget for 2015 Here is an agency-by-agency summary of President Barack Obama’s proposed budget for fiscal 2015, beginning next Oct. 1. The top-line figures do not include spending on automatic benefit and subsidy programs that together account for 70 percent of government spending. Figures for many of those programs […]

0
Telemedicine – Patient video conferences and HIPAA

Telemedicine – Patient video conferences and HIPAA

Skype With Patients? HIPAA Says “No Go” Oklahoma Medical Board Says No to Skype With Patients, Yes to Telemedicine; Here’s What You Need to Know The recent Oklahoma medical board sanction against Thomas Trow, MD, sparked concern over the practices of telemedicine and telepsychiatry. Using Skype, Trow conducted online video appointments and prescribed controlled substances […]

0
Eight Ways CEO's Are Commonly Overpaid

Eight Ways CEO’s Are Commonly Overpaid

Eight Outrageous CEO Perks 1. Personal security 2012 value: $1,531,675 CEO: Lawrence Ellison Company: Oracle Corporation Larry Ellison, Oracle’s high-profile founder and CEO was recently thrust into the spotlight during The America’s Cup races in the San Francisco Bay Area. Team USA came from behind to win eight straight races to beat the New Zealand team. […]

0
Shiny new apps need to be aggressively vetted before users can trust them!

Shiny new apps need to be aggressively vetted before users can trust them!

Here is the up / down on encryption and privacy service offerings Post Snowden. Techies vs. NSA: Encryption arms race escalates Encrypted email, secure instant messaging and other privacy services are booming in the wake of the National Security Agency’s recently revealed surveillance programs. But the flood of new computer security services is of variable […]

0
Companies That Disregard Their Own Privacy Policies

Companies That Disregard Their Own Privacy Policies

Examples of FTC Cases: Companies that Violated Their Own Privacy Policy Here are some examples of cases in which the FTC has taken action against businesses that violated their own privacy policy (in addition to other violations in some instances):News Release: 06/24/2010 – Twitter Settles Charges that it Failed to Protect Consumers’ Personal Information; Company Will […]

0
Time Magazine – The Informers – hacktivists’ profiles

Time Magazine – The Informers – hacktivists’ profiles

The Geeks Who Leak The President calls them a threat to national security. The Internet calls them heroes. A new wave of hacktivists is changing the way we handle secrets The 21st century mole demands no payments for his secrets. He sees himself instead as an idealist, a believer in individual sovereignty and freedom from […]

0
Ohio 27th state to implement Face Recognition

Ohio 27th state to implement Face Recognition

Ohioans not told how license photos used Without informing the public and without first reviewing security rules for the system, Ohio law enforcement officers started using facial recognition technology more than two months ago, scanning databases of driver’s license photos and police mug shots to identify crime suspects, The Enquirer has learned. After they launched […]

0
More details on Govt Spying Lawsuits

More details on Govt Spying Lawsuits

Obama administration drowning in lawsuits filed over NSA surveillance Attorneys for the Electronic Frontier Foundation have sued the Obama administration and are demanding the White House stop the dragnet surveillance programs operated by the National Security Agency. Both the White House and Congress have weighed in on the case of Edward Snowden and the revelations […]

0
Gangs Controlling Prisons From Within - Using Polygraph To Help Weed Out Corruption

Gangs Controlling Prisons From Within – Using Polygraph To Help Weed Out Corruption

Baltimore jail’s security chief failed polygraph test Maryland’s top corrections official disclosed for the first time Thursday that the head of security at the embattled Baltimore City Detention Center failed a polygraph test aimed at weeding out corrupt members before she was fired. Secretary of Corrections Gary Maynard made that revelation on a day when […]

0
Bush, Obama and Verizon Team Up To Collect Your Calls

Bush, Obama and Verizon Team Up To Collect Your Calls

On national security, Obama follows Bush’s lead   It’s an overstatement to say that it’s beginning to look like President George W. Bush’s fourth term. Still, that characterization by former Bush press secretary Ari Fleischer carried the ring of truth Thursday with the report that a National Security Agency telecommunications program that Americans first became […]

0
Smart Phones Fatal Security Flaws

Smart Phones Fatal Security Flaws

Smartphones another avenue for hackers Smartphones are increasingly popular not only with consumers, but also with thieves who see the devices as another way to tap into bank accounts and other sensitive information, experts say. Many consumers simply don’t realize how vulnerable their Androids, iPhones and other devices can be. An April study by the […]

0
Congress Wrestles Blame For The Boston Bombings

Congress Wrestles Blame For The Boston Bombings

Five Questions in Congress About the Boston Bombings Congress doesn’t agree on much these days, and the Boston bombings are no exception. The tragedy has triggered a wide-ranging debate about why the marathon plot went undetected, who shoulders the blame and how the security weaknesses the bombing highlight can be shored up. Here are five […]

0
NASA and China Espionage

NASA and China Espionage – 3/21/13

Lawmaker calls for NASA data review after scientist arrested NASA appears to have blocked public access to a server containing thousands of technical documents amidst charges by one US lawmaker over lapses of security involving a Chinese national who was hired as a contractor and was arrested while attempting to return to China. The developing […]

0
50 States Comparisons

50 States Comparisons – 3/6/13

50 States Comparisons   This is a worthwhile download.  Updated annually, it ranks all U.S. States and quantifies things like: tax burden, cost of doing business, state debt, gaming revenue, lottery expenses, population change, commodity production, education scores and salaries, utility prices, crime rates, law enforcement spending, relative health, social security payout and many others.  […]

0
HIPAA HITECH Compliance Checklist

HIPAA HITECH Compliance Checklist

New HIPAA/HITECH act omnibus rule: What must be done to comply? From international law firm Arnold & Porter LLP comes timely views on current regulatory and legislative topics that weigh on the minds of today’s physicians and health care executives. Health care professionals and others working with personal medical information face considerable compliance risks and […]

0
Personnel work at the Air Force Space Command Network Operations & Security Center

China Cyber-Espionage – 2/27/13

Experts: China has hacked most of Washington Start asking security experts which powerful Washington institutions have been penetrated by Chinese cyberspies, and this is the usual answer: almost all of them. The list of those hacked in recent years includes law firms, think tanks, news organizations, human rights groups, contractors, congressional offices, embassies and federal […]

0
China Slapped On The Wrist For Stealing Secrets

China Slapped On The Wrist For Stealing Secrets – 2/20/13

Cybersecurity: Experts Wonder If New Obama Order Goes Far Enough The New York Times’ publication of sensational charges by security contractor Mandiant about Chinese cyberattacks directed by a unit of the People’s Liberation Army led experts to note that the threat of cyberattacks is growing worldwide. Besides the New York Times Co. (NYSE:NYT), other companies, […]

0
Excellent HIPAA Resource Center

Excellent HIPAA Resource Center – 2/30/13

HIPAA Statutes, Regulations and Guidance This law firm resource center contains links to pertinent statutes, regulations and guidance about HIPAA privacy and security.  It is worth bookmarking. Read More

0
Legacy of U.S. Wars in Iraq

Legacy of U.S. Wars in Iraq? – 2/7/13

Iraq: A Broken Justice System Iraq’s leadership used draconian measures against opposition politicians, detainees, demonstrators, and journalists, effectively squeezing the space for independent civil society and political freedoms in Iraq, Human Rights Watch said today in its World Report 2013. The number of violent civilian deaths in Iraq increased in 2012, for the first time […]

0
Technology's Call Center War VS Fraud

Technology’s Call Center War VS Fraud – 1/13/13

How Emerging Technology Fights Fraud in the Call Center To battle innovative attacks on call centers, enterprises and IT outsourcing service providers are looking to technologies like voice biometrics and behavioral analytics. As companies have gotten better at detecting and preventing online fraud in recent years, would-be criminals have redirected their efforts to the corporate […]

0
Facial Recognition Guidelines

FTC Facial Recognition Guidelines – 11/5/12

FTC Recommends Best Practices for Companies That Use Facial Recognition Technologies Companies Using the Technologies Should Design Services with Consumer Privacy in Mind The Federal Trade Commission today released a staff report “Facing Facts: Best Practices for Common Uses of Facial Recognition Technologies” for the increasing number of companies using facial recognition technologies, to help […]

0
Philippine Prison Call Centers

Philippine Prison Call Centers? – 11/5/12

Philippines eyeing prison call centers The Philippines is launching an initiative that could soon see call centers being set up in prisons and run by inmates. The move is a program, dubbed BILIB I.T., that aims to give convicts new skills to raise their chances of employment and reintegrating back into society upon release, according […]

0
Government Over Time Out Of Control

Government Over Time Out Of Control! – 10/20/12

Homeland workers made $900,000 in OT over 6 years During the past six years, employees in the state Division of Homeland Security and Emergency Management have collected more than $900,000 in overtime pay, filling in at a emergency call center in the state Capitol’s basement, according to an audit released Tuesday. Homeland security workers received […]

0
Where Do Website Attacks Originate

Infographic: Where Do Website Attacks Originate? – 9/25/12

Infographic: Where Do Website Attacks Originate? Web security firm Incapsula this week released the first of what it says will be a monthly report that breaks down the origin of Internet attacks by country. The first survey confirmed that the U.S. and China produce the highest volume of attacks on websites, but they don’t necessarily […]

0

Retail Industry Ranked Worst – 7/3/12

Retail Industry Ranked Worst in Website Vulnerability It’s an honor that retail would probably just as soon be bestowed on another industry: Retail was 2011’s worst-performing industry in website security, with retail sites suffering an average of 121 serious vulnerabilities each, according to the 12th annual Website Security Statistics Report from WhiteHat Security, released last […]