In a rare criminal case involving a HIPAA violation, a former respiratory therapist in Ohio has been convicted of wrongly obtaining individually identifiable protected health information.
In an in-depth interview, Michael Sentonas of breach response specialist CrowdStrike discusses how a focus on malware detection may still be leaving organizations exposed and describes the firm's new efforts in the Asia-Pacific region.
In the wake of a majority of British voters opting to leave the European Union, the U.K. Information Commissioner's Office argues that the country should still comply with the EU's data privacy rules. But will politics get in the way?
Kaspersky Lab says that its original estimate of how many remote desktop protocol server credentials were offered for sale in the now shuttered online cybercrime marketplace xDedic may have been far too low, based on new data coming to light.
In what's being dubbed as the largest coordinated takedown to date, federal authorities have arrested 301 individuals for participating in Medicare and Medicaid fraud schemes involving $900 million in false billings.
With ransomware attacks surging, all organizations should ensure they have an enterprise backup and disaster recovery plan in place, and eliminate all unnecessary, outdated or disused applications and services running on endpoints and servers, says ESET's Mark James.
A short chat with the alleged seller of the LinkedIn and MySpace data begs more questions about how the services were compromised and if there are more large breaches to come.
In the event of a "Brexit" - British exit - from the European Union following this week's referendum, the U.K. would likely still have to comply with EU data protection laws, but also face cybercrime-related policing and prosecution challenges.
With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right Vulnerability Management (VM) solution can monitor your environment, enabling you to: discover devices running in your network, determine whether...
With attackers getting more sophisticated every day, manual methods
of locating and testing web-based apps are no longer enough. The
right Web Application Scanning (WAS) solution can help you
systematically: discover web apps running in your network, determine
whether or not they are vulnerable to attack,...
Data is the currency of the digital age and
the lifeblood of organizations, so strategies to protect
corporate data are growing in importance and are now
a topic of C-suite consideration.
In a recent survey conducted
by IDG Research Services, investing in cloud services
ranks as the second priority (55%)...
CISOs are facing some of the biggest challenges,
regardless of company size, with
fast-changing technologies such as cloud
and security risk growing at an exponential
rate.
Download this interview with Qualys CEO Philippe Courtot to gain his insight on:
The biggest challenges facing CISOs today
Advice for...
As technology proliferates beyond traditional
systems and networks into mobility and cloud,
the lines around securing such expanded technology
are becoming blurred. Security threats
are coming in from all angles, and IT must stay
ahead of any vulnerabilities before they occur.
Download this interview with...
As a mid-sized or smaller organization, there is a lure of feeling safety in
obscurity. "We're too small to be a target for cyber attacks" is a common refrain
used to justify a lax network security posture. Unfortunately, it's a refrain that
may come to haunt you.
The truth is your company doesn't have to be...
When web applications are breached, enormous amounts
of sensitive business data can be lost.
These types of attacks can occur at organizations
of all sizes and levels of IT sophistication, and can
affect tremendous amounts of data.
Web applications are popular targets because they are accessible to almost...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.