by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : August 15, 2015
CRITICAL READ WHAT: “Securing Electronic Health Records on Mobile De- vices,” the first document in a new series from the National Institute of Standards and Tech- nology’s National Cybersecurity Center of Excellence. WHY: The growing use of mobile devices to store, access and transmit electronic health information is outpacing privacy and security protections for those devices, which puts medi- cal information at risk for theft, according to NIST. The document is a step-by- step guide to help health care providers make mobile devices more secure and better able to protect patient information with- out interfering with advances in communications technology. It includes a detailed secu- rity architecture that can be copied or re-created. The guide adheres to the security rules in the Health Insurance Portabil- ity and Accountability Act and incorporates standards and best practices from NIST and others. It also accounts for implementation under different circumstances, including in-house versus out- sourced cybersecurity activities. Comments on the draft pub- lication should be sent to HIT_ NCCoE@nist.gov by Sept. 25. VERBATIM: “All health care organizations need to fully understand their potential cybersecurity vulnerabilities, the bottom-line implications of those vulnerabilities and the lengths attackers will go to exploit them.” FULL REPORT: is.gd/FCW_SecureEHR Trending is the ceiling for the Defense Intelligence Agency’s new Enhanced Solutions for the IT Enterprise contract $6 billion 8 August 15, 2015 FCW.COM A federal group responsible for track- ing transnational cyber criminals who traffic in stolen information, credit cards, child pornography, fake docu- ments and drugs just got a technology upgrade. In July, Immigration and Customs Enforcement’s Homeland Security Investigations (HSI) unit unveiled a 5,000-square-foot forensic laboratory that has substantially more space for conducting cyber operations, including closer analysis of criminal hard drives and video and audio forensic capabili- ties that rival anything seen on “CSI.” The Cyber Crimes Center (C3) in Fairfax, Va., provides computer and cyber-based technical services that support domestic and international investigations into cross-border crimes. Eric Feldman, HSI’s unit chief for cyber crimes investigations, told FCW that the new lab is five times the size of C3’s previous facility. The Customs Service, which was absorbed into U.S. Customs and Border Protection, estab- lished the lab in 1997, and the facil- ity had not had a significant technical overhaul for quite some time, accord- ing to DHS officials. HSI’s hundreds of field offices in the U.S. and overseas — as well as state, local and international law enforce- ment agencies — have been deluging C3’s 278 computer forensics agents and analysts with petabytes of data from electronic files and hard drives that must be analyzed as part of crimi- nal investigations. Those entities also come to C3 for help in tracking down criminals online. According to DHS, HSI processed 5.2 petabytes of data in fiscal 2014 — the equivalent of 83 billion pages of images or 95 billion PowerPoint files. Furthermore, the volume of data pre- sented by field agents increased 4,000 percent from 2004 to 2012. The new facility includes expand- ed space for the computer forensics, cybercrimes and child exploitation units. Each has substantially upgrad- ed software, digital analysis and other advanced and sometimes customized forensics IT, according to DHS. Jim Cole, national program manager for victim identification in the Child Exploitation Investigations Unit, said he has unique video and audio analy- sis technologies and capabilities that allow him to examine digital photos and extract details that can break child exploitation cases. — Mark Rockwell ICE unveils expanded cyber forensics lab Join the conversation FCW uses Twitter to break news, field questions and ask our own. Learn more at Twitter.com/FCWnow. 8:46 AM - 20 Jul 2015 Anthony K. Robbins @AKRobbins2010 Reply Retweet Favorite Rep. @GerryConnolly on the future of #FITARA & his plans to watch over the act via @FCWnow http://ow.ly/PF5Mn 0815fcw_003-008.indd 8 7/28/15 4:02 PM
July 30, 2015
August 30, 2015