IT security practitioners realize much value from the monthly cybersecurity index created a year ago by Mukul Pareek and Dan Geer. Why? They benefit from knowing how others see the evolving threat environment.
The time to select a breach resolution vendor is before you need one, stresses security specialist Robert Peterson. So what questions should organizations ask when choosing a vendor?
Expectations clashed with reality during Howard Schmidt's 28-month tenure as the White House's first cybersecurity coordinator, a job he is slated to leave in mid-June.
President Obama ordered increasingly sophisticated cyberattacks to cripple Iranian nuclear enrichment centrifuges as part of a major expansion of America's first persistent use of cyberweapons, according to a new report.
Yet another high-profile breach involving a stolen unencrypted laptop is prompting Sen. Al Franken, D-Minn., to consider whether the nation needs an encryption mandate for healthcare information.
Those involved in developing health information exchanges can take advantage of a new resource from the Markle Foundation offering guidance on key issues, including privacy and security.
Flame is designed to carry out cyber espionage and steal valuable information, including but not limited to computer display contents, information about targeted systems, stored files, contact data and audio conversations.
Israel is being blamed - or, perhaps, taking credit - for the creation of Flame, the sophisticated cyberspyware that has targeted organizations in the Middle East, especially its mortal enemy, the government of Iran.
The National Institute of Standards and Technology's guidance recommends how and when cloud computing is appropriate, addresses risk management issues and indicates the limits of current knowledge and areas for future research and analysis.
IPv4 - the protocol the Internet originally was built on - is quickly running out of addresses, and organizations must prepare for IPv6. What should they consider, and what steps can they take now?
It's been six years since the Department of Veterans Affairs experienced a huge breach. What breach-prevention steps has the VA taken since then, and what's left to be done?
IT risk management, cyber insurance, privacy - these are hot topics for security leaders, but not for their boards of directors. Why do senior executives still fail to see IT risks as business risks?
Why are socially engineered schemes causing so many headaches? Symantec's new Internet Security Threat Report shows attacks are growing. Here's a list of Symantec's recommendations to thwart risks.
The Obama Administration has unveiled a "digital government" strategy that requires federal agencies to launch new mobile applications. The strategy calls for standardized implementation of privacy controls.
Imagine a computer network that can fool intruders into seeing configurations that in reality don't exist, making it hard for them to invade the system. That's what Scott DeLoach is trying to figure out how to do.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.