Two weeks after the launch of Heartbleed.com, traffic to the site remains strong and tweets still flow at a brisk pace. Site creator Codenomicon is helping IT practitioners to mitigate the OpenSSL flaw - and attracting customers, too.
Many business leaders lack a clear understanding of the value of identity and access management. CISO Christopher Paidhrin offers a scenario for how to make the case for an IAM investment.
Improper disposal of protected health information poses significant risks, as recent breach incidents demonstrate. That's why organizations need to do a better job vetting disposal companies and verifying that data or devices are actually destroyed.
Some organizations proudly tout their privacy protection policies. Others, such as The Everett Clinic in Washington state, actually enforce their policies with bold action.
Not all hackers are the same, and that presents problems in defending against them. Understanding each type of hacker can help organizations better prepare for digital assaults.
Here's why it's important to carefully consider offering free credit monitoring, as well as breach prevention details, to the victims of major information breaches.
A breach incident affecting patients at Stanford Hospitals & Clinics offers yet another example of the risks involved when sharing data with business associates and their subcontractors.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.