Like last year's breach of the online dating site Ashley Madison - tagline: "Life is Short. Have an Affair." - this year's release of the "Panama Papers" is holding individuals accountable for actions which, if not always illegal, in many cases appear to have at least been unethical.
Now, more than ever, managing the risks involved in working with business associates and their subcontractors should be a top priority for healthcare organizations in their efforts to safeguard patient information, says risk management expert Andrew Hicks, who explains why.
Visa's new plan to help merchants speed checkout times for EMV chip payments sounds good, in theory. But in reality, it isn't likely to have much immediate impact on either speeding EMV adoption or enhancing the user experience.
This is arguably the most unsettling time in history to be a CIO. The IT landscape is shifting at a rapid pace with advances in social media, mobility and big data. The proliferation of advanced robotics is just around the corner and the Internet of Things is connecting even the most mundane objects to the...
The release of a new Microsoft operating system is always an important event for IT departments, and Windows 10 is no exception. However, the adoption of a new operating system can also be a period of increased security vulnerability particularly if the IT department doesn't have the tools, technologies and processes...
For the second time in two years, federal regulators have slapped New York Presbyterian Hospital with a multi-million dollar penalty as part of a HIPAA settlement. The latest incident involved filming of patients without their permission.
Epic Systems' successful lawsuit against India's Tata Consultancy Services raises many security questions. For example, why did Epic find out about the allegedly inappropriate downloading of trade secrets from an external whistleblower, rather than as a result of internal detection efforts?
An effective way for attackers to appear legitimate in face of security solutions is by exploiting logic
flaws in the functionality of existing systems. These logic flaws are what we
call design vulnerabilities.
With design vulnerabilities, the threat actor exploits a feature of a given product. It's not that...
A North Carolina orthopedic clinic will pay a $750,000 penalty as part of a breach-related federal settlement involving the release of 17,300 X-ray films containing patient information to a vendor without having a business associate agreement in place, as required under HIPAA.
"Internet of Things" developers must think about how attackers might attempt to exploit a device, and why, and then write code designed to block such attacks, says Charles Henderson, IBM's global head of security testing and threats.
What could be worse than a ransomware infection? How about getting infected by "torture ransomware" that uses a sadistic puppet to taunt you, slowly deleting your encrypted files while increasing the ransom demand until you pay?
Today's cyber actors are becoming more sophisticated, agile and capable of getting past any network security. Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats.
Download this white paper to explore:...
i2 Enterprise Insight Analysis helps the analyst see the forest through the trees. Analysts' using i2 EIA will discover that these events are all related. All the anomalies are connected to DHCP servers initially infected by malware. The new specialty of cyber threat analysis, also referred to as cyber analysis, is...
Cyberattacks are a clear and present threat to government agencies. Full and detailed data analysis is one of the only emerging ways to get ahead of these threats. According to industry experts, cyber threat analysis currently relies on automated as well as human input.
Download this whitepaper to explore:
...
With the right combination of multi-dimensional analysis capabilities and advanced analytics, you can turn your defensive cyber strategy into a proactive one - and counter and mitigate more threats.
Download this infographic to explore:
How many cyber attacks an organization faces in one week;
How much...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.