Find additional Electroblogs using the search box below.
Every security engineer is no doubt familiar with the critical principles of security, namely the CIA Triad: Confidentiality, Integrity and Availability (or, AIC Triad). [1] If the Gartner Group has its way, there soon will be a fourth pillar to the CIA Triad: Safety. In…
Data Provenance (DPROV) in the health Information Technology (IT) context refers to the creation of health IT data and the tracking of its permutations throughout its life cycle. As the demand for data exchange increases, the need for confidence in the “authenticity, trustworthiness and reliability…
Until passwords are extinct, we must manage them. After passwords are extinct, we must manage their replacements.
For those familiar with the Federal Information Security Management Act (FISMA) evaluations, the concept of Authenticator Management should be familiar from the security…
Technologies in the healthcare IT industry are converging with time and are far out pacing the legacy systems used by hospitals and healthcare providers. Cloud technology offers a replacement for these legacy systems with easier and faster access to this data as defined by the way it is stored (i.e…
The burgeoning health information technology (HIT) sector is fast being transformed into a healthcare-specific Internet of Things (IoT), a cloud based, globally interconnected intelligent network. The IoT is rapidly making inroads into HIT, especially in the realm of medical device use and…
This month, the National Institute of Standards and Technology (NIST) published the final form of a document that Electrosoft coauthored with NIST scientist Michaela Iorga, NIST Interagency Report (NISTIR) 7823, entitled “Advanced Metering Infrastructure Smart Meter Upgradeability Test…