The arrests of more than 90 individuals for their alleged involvement in the use of BlackShades malware is a sign of progress in the global fight against cybercrime, but some experts question whether the crackdown will serve as a fraud deterrent.
There are a number of reasons why the U.S. government indicted five Chinese army officers for hacking American corporate computers to steal intellectual property. Bringing the assailants to justice isn't one of them.
Under a new rule setting standards for the Obamacare health insurance exchanges, those who provide consumers with insurance enrollment assistance and then improperly disclose personally identifiable information can face civil monetary penalties.
An FTC administrative trial examining the data security practices of LabMD, headed by Michael Daugherty, is slated to begin May 20. The hearing could shed light into how the FTC evaluates security when pursuing enforcement actions.
More than 90 individuals have been arrested for their alleged involvement in the creation, distribution and use of BlackShades malware. The two-day roundup operation took place in 16 countries.
Five Chinese military officers have been indicted for hacking U.S. companies - incidents that had major consequences, including the shuttering of three American steel plants, according to U.S. Justice Department officials.
What does "IT security as a business enabler" mean? For a definition, Gartner's Paul Proctor looks to the way IT managers at a European car maker translate security problems into a language a CEO can understand.
In the struggle to comply with changing regulatory requirements amidst an evolving technological environment, addressing information security can be overwhelming for many healthcare providers. An expert offers tips for sustainable risk management.
A group of noted cryptographers, academics and business leaders will provide an independent assessment of the way the National Institute of Standards and Technology develops cryptographic standards and guidelines.
CIO John Halamka, M.D., a well-known blogger, says information security accounts for about half of his work at Beth Israel Deaconess Medical Center. He explains why that's the case and discusses a variety of projects, including a test of Google Glass.
As federal regulators weigh changes in the requirements for the HITECH Act electronic health record financial incentive program, it's essential that they adequately address privacy and security issues.
Organizations looking to build a better breach response strategy need to emphasize the basics, including ensuring they have a well-qualified response team in place, security experts, including attorney Ron Raether, advise.
A multi-layered approach known as "context-aware security" is the most effective strategy for fighting both insider and external cyberthreats, says Gartner analyst Avivah Litan, who explains how this strategy works.
Consumers around the world aren't overly concerned about Internet security, perhaps because they've experienced fatigue from the oversaturated media coverage of data breaches, Unisys Chief Information Security Officer David Frymier says.
The National Institute of Standards and Technology is developing new cybersecurity standards based on the same principles engineers use to build bridges and jetliners.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.