"Our role is changing in the fact that we see fraud being perpetrated in a new manner everyday via malicious software, banking Trojans and online theft," says Jean-FranÃ§ois Legault, senior manager of forensics and dispute services at Deloitte.
Eddie Schwartz didn't shy away from the offer to become RSA's first chief security officer after the security firm experienced a sophisticated advanced-persistent-threat breach. Instead, Schwartz embraced the hack as the reason to take the job. (See RSA to Get Its First Chief Security Officer.)
Fraud today is global. The same problems happening in the U.S. are simultaneously occurring in other parts of the world. For interested job seekers, there's never been a better time to enter the fraud examiner profession.
The Health IT Policy Committee has accepted recommendations that electronic health records software certified for future stages of the HITECH Act's EHR incentive program should be able to record corrections from patients or providers as well as transmit those corrections to others.
Many implantable medical devices have wireless connections that enable physicians to monitor patients. But with that wireless connectivity comes the risk of a hacker attack with potentially life-threatening results.
Among the 12 computer-related job classifications tracked by the Department of Labor's Bureau of Labor Statistics, information security analysts was one of only two categories to report no unemployment during the second quarter of 2011.
We all know the cost of regulatory compliance - how expensive it can be to meet the standards of HIPAA, HITECH and other industry guidelines. But two organizations this week learned hard lessons about the cost of non-compliance.
The U.S. Department of Health and Human Services' Office for Civil Rights entered into a resolution agreement with the University of California at Los Angeles Health System to settle violations of the HIPAA Privacy and Security Rules.
RSA customers who feel victimized by last March's breach of the security vendor's computers have viable options that include continued use of the SecurID authentication tokens, those offered by competitors, or something entirely different: biometrics.