The Latest News

  • Phishing Leads to Healthcare Breach

    Experts Say More Employees Are Being Targeted Phishing Leads to Healthcare Breach

    A breach at St. Vincent Medical Group in Indiana is the latest example of a healthcare organization falling victim to an apparent upswing in phishing attacks targeting employees. And it was the third data breach for the provider organization. Read more...

  • Medicare Contractors Have InfoSec Gaps

    Report Evaluates CMS Vendors' Information Security Programs Medicare Contractors Have InfoSec Gaps

    Some Medicare administrative contractors have made improvements in their information security programs, but most still have a way to go in closing a number of key gaps, according to a new government watchdog report. Find out the areas of concern. Read more...

  • SSNs to Disappear from Medicare Cards

    Obama Signs Bill Providing Funding for Anti-Fraud Move SSNs to Disappear from Medicare Cards

    President Obama has signed a bill that provides $320 million in funding to remove Social Security numbers from Medicare ID cards in an effort to fight identity theft and fraud. Find out the time line. Read more...

  • HIMSS15: 3 Privacy, Security Takeaways

    Interoperability, Cyberthreats and New Targets HIMSS15: 3 Privacy, Security Takeaways

    Three key themes tied to privacy and security emerged at this year's Healthcare Information and Management System's Society Conference, which drew more than 43,000 attendees. Read more...

  • Cyber-Attack Risk Mitigation: Key Steps

    How to Avoid Becoming the Next Hacker Victim Cyber-Attack Risk Mitigation: Key Steps
    Mac McMillan

    Healthcare organizations need to take several key steps to protect their environments from the type of cyber-attacks that recently affected Anthem Inc. and Premera Blue Cross, says security expert Mac McMillan of CynergisTek. Read more...

  • Article

    Cloud Security Certification Launched

    Designed to Measure Advanced Competence By Geetha Nandikotkur
    Cloud Security Certification Launched

    (ISC)² and the Cloud Security Alliance have unveiled a new cloud security professional certification designed to measure advanced competence. Will training for the certification help professionals gain a better understanding of cloud security?

  • Article

    Adopting the Cybersecurity Framework

    Interview with Unisys CISO David Frymier By Eric Chabrow
    Adopting the Cybersecurity Framework

    David Frymier, the chief information security officer at Unisys, says the IT services company believes it will be a more secure company by adopting the federal cybersecurity framework.

  • Article

    Internet of Things: Legal Issues

    Attorney Stephen Wu on Impact of Increasing Computerization By Eric Chabrow
    Internet of Things: Legal Issues

    At a time of sweeping change in cybersecurity, attorney Stephen Wu says organizations need to be prepared from a compliance, incident response and risk management perspective to address novel situations stretching society's capabilities.

  • Blog

    RSA Conference 2015: Visual Journal

    Attendees Flock to Sessions, Tchotchkes, Selfie Sticks By Mathew Schwartz
    RSA Conference 2015: Visual Journal

    The buzz at RSA could be felt beyond the session rooms, not least in the Expo Hall, with demonstrations that tapped Google Cardboard and offered an array of enticing tchotchkes - including selfie sticks and sharks with laser pointers on their head.

  • Article

    Inside the Cybersecurity Nexus

    ISACA's Eddie Schwartz on New Strategies for Growing Skills By Tom Field
    Inside the Cybersecurity Nexus

    As a longtime security leader, Eddie Schwartz has felt acutely the pain of the security skills crisis. Now, as chair of ISACA's Cybersecurity Task Force, he's helping organizations do something about it.

More news...

Webinars

  • Maintaining Compliance with the Gramm-Leach-Bliley Act Section 501(b)

    This workshop will expand on many of these areas and present practical and proven approaches many institutions have adopted in order to comply with Section 501(b) of GLBA and Section 216 of Fair and...

  • PREMIUM MEMBER EXCLUSIVE

    2014 Faces of Fraud

    Fraud Summit - San Francisco 2014 - As the Target and Neiman Marcus incidents prove: Retail point-of-sale breaches are on the rise, creating greater payment card fraud headaches for banking...

More webinars...

White Papers

More whitepapers...
ARTICLE Uber Breach Affects 50,000 Drivers

Information on 50,000 drivers for ride-sharing service Uber was breached in May 2014, the company...

Latest Tweets and Mentions

ARTICLE Uber Breach Affects 50,000 Drivers

Information on 50,000 drivers for ride-sharing service Uber was breached in May 2014, the company...

The ISMG Network