Citing concerns about identity theft risks, a new GAO report urges the Centers for Medicare and Medicaid Services to step up its efforts to remove Social Security numbers from Medicare beneficiaries' ID cards.
What is hostile profile takeover, and why does this emerging threat pose such a risk to smart phone users? Dave Jevans, CTO of Marble Security, describes this and other new mobile threats.
New revelations about how the National Security Agency collects and uses e-mail and instant-messaging contact lists demonstrate bad data governance practices that raise serious concerns, a leading privacy attorney says.
Gen. Keith Alexander's departure from the National Security Agency has nothing to do with leaks by former contractor Edward Snowden about top-secret U.S. government programs to amass telephone and Internet records of Americans, an NSA spokeswoman says.
The average insider scheme lasts 32 months before it's detected, says threat researcher Jason Clark, who suggests using a combination of the right technologies and the right processes is the key to improving detection.
The Department of Veterans Affairs faces ongoing breach prevention challenges, according to recent investigations. Learn what the scrutiny has revealed and what the VA is doing to bolster breach prevention.
More than two-thirds of IT security specialists working for the U.S. federal government say their agencies are ill-prepared to adequately defend their IT systems, a new survey reveals.
Our inaugural Fraud Summit on Oct. 22 at the Meadowlands in New Jersey will feature an impressive lineup of information security leaders offering timely insights about practical risk mitigation strategies.
A regulatory framework now in development, which will address health IT risk issues, needs to place an emphasis on cybersecurity concerns, says federal adviser Julian Goldman, M.D.
IT systems shuttered during the partial government shutdown are more vulnerable than usual to cyber-attacks as they're restored, security experts familiar with government IT systems say.
Attorney Maureen Ruane, who has prosecuted dozens of healthcare fraud cases, explains how the rollout of electronic health record systems at hospitals and clinics is creating new potential opportunities for fraud.
An audit protocol from federal regulators is a useful tool for covered entities and business associates that are conducting a risk analysis and beefing up HIPAA compliance efforts, says security expert Bill Miaoulis.
The Department of Health and Human Services and some states are still busy working out technical issues to improve the functionality of health insurance exchanges that went live under Obamacare Oct. 1.
Security teams struggling to detect signs of threats hidden in mountains of data are attracted to big data analytics. But experts advise security professionals to take an incremental approach, starting out with smaller projects.
Mary Galligan, the just-retired head of the FBI's New York cyber unit, says the federal government can do more to help businesses take all the right steps to protect sensitive information and prevent breaches.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.