Texas has dropped a lawsuit that it filed last year against Xerox related to a dispute over access to Medicaid records containing PHI. Nevertheless, the case remains as one of the largest health data breaches listed on the federal tally.
Global eCommerce sales are predicted to reach $1.5 trillion in 2014 and are further predicted to grow by a meteoric 57% by 2017, according to eMarketer. A downside of this explosive growth is the increased opportunity for online fraud.
Building smarter rules around fraud detection and automating the process is proven...
Going by the number of headlines about data breaches, it appears the bad guys always seem to be one step ahead, skillfully customizing
malware and social engineering to get past our best defenses and evade detection. The problem is when it comes to advanced attacks, security teams can't see the forest of trees - too...
Spear phishing is a primary means by which APTs target and infiltrate networks. This e-book explores the various elements of these types of attacks, such as:
The characteristics of phishing emails;
How spear phishing and APTs are related;
How to protect against them and keep your organization safe from advanced...
Every day there is a story in the news, about another business that has fallen prey to cybercriminals. Are you confident your business is protected against these attacks? Join this webinar to learn how you can best protect your business, and avoid becoming next weeks news.
In this informative webinar, you will...
When it comes to mobility, enterprises are not nearly as secure as their security leaders believe them to be. In a global survey of 400 information security executives, 44 percent rate themselves at above average or superior when self-assessing their organizations' mobility security. Yet, 41 percent suffered a...
Information sharing and analysis organizations being formed under President Obama's new executive order must avoid becoming silos that only share cyberthreat intelligence "within their own walls," warns Deborah Kobza, executive director of NH-ISAC.
Some security experts contend that users of numerous types of Lenovo PCs and laptops are at risk of having their encrypted traffic get intercepted because of installed-by-default Superfish adware, which handles digital certificates insecurely.
Attacks are larger, adversaries more diverse, and damage is broader. These are characteristics of today's DDoS attacks, and organizations need a new approach to protection, says Verisign's Ramakant Pandrangi.
Extradited Russian national Vladimir Drinkman, who's been charged with masterminding the largest-ever hack attack in U.S. history, this week pleaded not guilty in U.S. federal court to 11 charges relating to the theft of 160 million payment cards.
When an FTC administrative trial on the data security practices of medical testing firm LabMD resumes March 3, an FTC judge could consider questions raised by a Congressional panel regarding Tiversa, a security firm at the center of the case.
Target is the high-profile example, but many organizations have been breached through third-party vulnerabilities. Where are the security gaps, and how can they be filled? BitSight's Stephen Boyer offers insight.
The Anunak/Carbanak gang continues to rob financial services firms and retailers, in part with ATM malware. A new report says the cybercrime gang has stolen up to $1 billion from banks in Russia, the U.S. and beyond.
From the information provided in interviews, Forrester has constructed a Total Economic Impact (TEI) framework for those organizations considering implementing IBM Datacap. The objective of the framework is to identify the cost, benefit, flexibility, and risk factors that affect the investment decision, to help...
Defining data via data discovery and classification is an often overlooked, yet critical, component of data security and control. Security and risk (S&R) pros can't expect to adequately protect data if they don't have knowledge about what data exists, where it resides, its value to the organization, and who can use...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.