Once a file enters the network, we often lack the tools to monitor the file's behavior. In essence, using the point-in-time model, the security professional cannot retry the file for guilt or innocence.
The Department of Veterans Affairs, in a cryptic message, disclosed a potential security flaw that exposed the personally identifiable information of 7,054 veterans in a patient database belonging to and managed by a vendor that provides home tele-health services to the VA.
Seeking a measured response to an attack on a non-critical infrastructure company requires carefully balancing a strong message to North Korea with one that doesn't result in escalating an encounter with a rogue nuclear nation.
As NIST launches an effort to address cyber risks concerning medical devices, security experts weigh in on whether the latest initiative will spur the change needed to protect such devices.
While the FBI blames North Korea for the hack attack against Sony Pictures, security expert Carl Herberger says the attack differs from previous nation-state attacks. Learn how organizations must shift defenses.
The response by Sony Pictures Entertainment executives to the hack attack against their company provides a number of great examples for how to not to handle a data breach. Here are 7 key mistakes they made.
The Internet reportedly went dark in North Korea on Dec. 22, days after President Obama pledged there would be a "proportionate response" to the cyber-attack on Sony Pictures Entertainment that the FBI blames on the North Koreans.
North Korea not only denies the Obama administration's allegations that it hacked Sony Pictures Entertainment, but promises "grave consequences" if the U.S. fails to agree to a joint probe of the breach.
The five biggest 2014 health data breaches listed on the federal tally so far demonstrate that security incidents are stemming from a variety of causes, from hacker attacks to missteps by business associates.
When you're thinking about securing your data assets and web site, how do you really know the value of what you're protecting? Akamai's Terrence O'Connor shares how to determine the cost of a data breach.
The FBI says it has traced the hack attack against Sony Pictures Entertainment to North Korea, and President Obama says that the United States will respond proportionately to the cyber-attack.
The Sony Pictures Entertainment hack, and the company's decision to yank the release of a film in the wake of hackers' threats, has provoked intense reactions. Read the comments and join the conversation.
The White House says that it's treating the hack attack against Sony Pictures Entertainment as a "national security matter." But it says it's too early in its investigation to definitively attribute the attacks to any particular group or nation.
The fiscal 2015 federal budget provides two agencies responsible for health information security and privacy activities with flat funding. Find out what plans are on hold, and why Congress wants greater scrutiny of EHR system interoperability.
Without ceremony, President Obama has signed five cybersecurity-related bills, including legislation to update the Federal Information Security Management Act, the law that governs federal government IT security.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.