The relative anonymity afforded by using the cryptocurrency known as Bitcoin appears to be in jeopardy, making it potentially less attractive for use in connection with cybercrime.
The loss of thousands of paper records for those with coverage from health insurer Independence Blue Cross sends a strong reminder that all employees within organizations need to be trained on data security best practices.
Jan. 5 is the deadline for participation in the fourth annual Healthcare Information Security Today survey, designed to examine the privacy and security priorities and challenges of healthcare organizations of all sizes.
"The FTC has awoken to the reality that there can be no privacy without cybersecurity," says Trend Micro's Tom Kellermann, in the wake of an FTC complaint against a data broker that sold payday loan applications to third parties.
North Korea criticizes President Obama for backing the release of a comedy about the assassination of its leader, denies ordering the hacking of Sony Pictures and blames the U.S. for its Internet and mobile network outages.
Distributed-denial-of-service attacks, fueled by the interconnected nature of smart devices, will only continue to increase, says Matt Moynahan, president of Arbor Networks. "The infrastructure itself is insecure," he says.
As federal regulators plan to resume random HIPAA compliance audits in 2015, organizations should prepare by conducting their own mock audits, advise attorneys Alisa Chestler and Donna Fraiche.
Driven by the spectre of external threats, attacks and growing business expectations, can CISOs focus on risk management and take a more integrated and systematic approach to defend against attacks?
While the FBI may have attributed the hack attack against Sony Pictures Entertainment to North Korea, many information security experts remain unconvinced, based on the evidence that's been released to date.
The Sony data breach is the top security news story of 2014, and ISMG has provided thorough coverage of the incident. Following is a comprehensive guide to Sony breach news, analysis and commentary.
After the complete collapse of network security at Sony Pictures - in the wake of its data breach - it's important that we highlight some of the organization's fundamental security mistakes. Here's a macro view of the lessons we must all learn.
Once a file enters the network, we often lack the tools to monitor the file's behavior. In essence, using the point-in-time model, the security professional cannot retry the file for guilt or innocence.
The Department of Veterans Affairs, in a cryptic message, disclosed a potential security flaw that exposed the personally identifiable information of 7,054 veterans in a patient database belonging to and managed by a vendor that provides home tele-health services to the VA.
Seeking a measured response to an attack on a non-critical infrastructure company requires carefully balancing a strong message to North Korea with one that doesn't result in escalating an encounter with a rogue nuclear nation.
As NIST launches an effort to address cyber risks concerning medical devices, security experts weigh in on whether the latest initiative will spur the change needed to protect such devices.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.