The Latest News

  • Using Apple Watch for EHR Access

    How Nebraska Medicine Weighs Privacy, Security Concerns Using Apple Watch for EHR Access
    Michael Ash, M.D.

    As healthcare entities embrace consumer wearable health devices, it's critical to carefully weigh patient benefits with the security and privacy risks. Michael Ash, M.D. of Nebraska Medicine, shares advice. Read more...

  • Medical Center Fraud Cases: 2 Indicted

    Federal Income Tax and Billing Fraud Alleged Medical Center Fraud Cases: 2 Indicted

    The Department of Justice has announced the indictments of two individuals in separate fraud cases affecting the University of Pittsburgh Medical Center. The cases spotlight the challenges healthcare organizations face in the fight against fraud. Read more...

  • Shoring Up HealthCare.gov Security

    With Obamacare's Future Solidified, Privacy Fears in Spotlight Shoring Up HealthCare.gov Security

    As hackers increasingly focus their attacks on the government and healthcare sectors, it's more critical to ensure that consumers' personal data is handled securely on Obamacare's HealthCare.gov website as well as state health insurance exchanges. Read more...

  • Website Error Leads to Data Breach

    Blue Shield of California Fixes Coding Problem Website Error Leads to Data Breach

    An error in a coding upgrade for a Blue Shield of California website resulted in a breach affecting 843 individuals. The incident is a reminder to all organizations about the importance of sound systems development life cycle practices. Read more...

  • Unencrypted Device Breaches Persist

    Health Data Breach Tally Shows String of Theft Incidents Unencrypted Device Breaches Persist

    Although hacker attacks have dominated the recent headlines, a snapshot of the federal health data breach tally shows that stolen unencrypted devices continue to be a common breach cause, although these incidents usually affect far fewer patients. Read more...

  • Blog

    Can Selfies Fight Payment Card Fraud?

    MasterCard Tests Facial Recognition App By Mathew Schwartz
    Can Selfies Fight Payment Card Fraud?

    MasterCard is testing a smartphone app that lets users approve online transactions using facial recognition, via the equivalent of taking a selfie. But could such technology be spoofed, and will it reduce card fraud?

  • Article

    Phishers Felled Bitcoin Exchange

    $5 Million Bitstamp Breach Detailed in Unconfirmed Report By Mathew J. Schwartz
    Phishers Felled Bitcoin Exchange

    An unconfirmed post-breach report for bitcoin exchange Bitstamp shows the organization was targeted by a sustained attack that combined phishing via email and Skype with macro malware to successfully steal almost 19,000 bitcoins, worth $5 million.

  • Article

    Cisco to Acquire OpenDNS

    $635 Million Deal to Boost 'Internet of Things' Security By Mathew J. Schwartz
    Cisco to Acquire OpenDNS

    Cisco announced plans to pay $635 million to purchase cloud security firm OpenDNS to better secure the "Internet of Everything." OpenDNS says the acquisition will leave its products and personnel intact.

  • Interview

    PCI Encryption Standard Updated

    How Optional Standard Can Ease PCI-DSS Compliance By Tracy Kitten
    PCI Encryption Standard Updated

    The PCI Security Standards Council has just released version 2 of its point-to-point encryption standard. Jeremy King of the PCI SSC explains how this optional standard can complement PCI-DSS compliance.

  • Article

    Should BAs Be HITRUST-Certified?

    Some Covered Entities Requiring Vendors Earn Certification By Marianne Kolbasuk McGee
    Should BAs Be HITRUST-Certified?

    HITRUST says a growing number of healthcare organizations, seeking to improve risk management, are requiring that their business associates comply with its Common Security Framework. But some experts question whether that's a viable strategy.

More news...

Webinars

  • PREMIUM MEMBER EXCLUSIVE

    Changing Perceptions and Attitudes - A New Way of Thinking About Defense

    To date, the most common reaction to targeted attacks has been for organizations to just do what they have always been doing, but harder. That isn't going to work. We need to look at this problem...

  • PREMIUM MEMBER EXCLUSIVE

    Identity Theft vs. Identity Fraud

    Fraud Summit Video Series - New York 2013 - Identity fraud and the creation of synthetic identities often result from identity theft, but the strategies organizations follow to prevent ID theft and...

More webinars...

White Papers

More whitepapers...
ARTICLE Why Info Sharing Is 2015's Hot Topic

While financial services have focused attention on information sharing for the past two years,...

Latest Tweets and Mentions

ARTICLE Why Info Sharing Is 2015's Hot Topic

While financial services have focused attention on information sharing for the past two years,...

The ISMG Network