Would encryption, two-factor authentication and other measures stop a determined adversary from stealing millions of U.S. government personnel files? No, a former CIA CISO says. Read how Robert Bigman would defend against OPM-style cyber-attacks.
The Office of Personnel Management data breach is merely a symptom of a much larger problem across all federal government executive branch agencies, and it's not going away anytime soon.
Updating the slow-moving Mutual Legal Assistance Treaty process is critical to bringing cyber law enforcement into the 21st century. That's why Congress needs to take prompt action.
Just as 9/11 shattered our assumptions about the impregnability of U.S. defense systems, the recent Anthem Inc. breach and other hacking incidents in healthcare show that we need a re-examination of what information risk management really requires
"Align technology with businesses" is an old phrase. But information security is now part of this change, making strides to align with growth as a business enabler. Enter: the converged technology operations center.
Breaches can happen even when there are strong protections in place. But healthcare organizations can do more to prepare for breaches and respond in the best possible way to protect patient information.
The rapid rise in cyber-attacks on healthcare organizations necessitates the use of a cyber-centric risk management framework. Recent incidents, including the hacking attack on Community Health Systems, show healthcare is an easy target.
A former senior adviser at the HHS Office for Civil Rights offers his predictions about OCR's HIPAA enforcement and regulatory activities for the year ahead in the wake of the office's leadership changes.
Healthcare organizations and their business associates need to make three important resolutions in 2015 to better safeguard patient data and avoid the enforcement wrath of regulators.
After the complete collapse of network security at Sony Pictures - in the wake of its data breach - it's important that we highlight some of the organization's fundamental security mistakes. Here's a macro view of the lessons we must all learn.
Organizations in all business sectors should take a series of steps to guard against "visual hacking," a low-tech method used to capture sensitive, confidential and private information for unauthorized use.
More organizations are looking to "continuous security" to monitor their ever-expanding network perimeters. But what are the critical elements of effectively using this approach?
You need to combine IT security knowledge with business acumen if you want to find yourself among the ranks of chief information officers and other high-level positions. Here's how privacy can help.
To prevent privacy breaches involving social media, healthcare entities and their business associates need a solid plan that includes comprehensive policies and lots of communication and training.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.