Why are socially engineered schemes causing so many headaches? Symantec's new Internet Security Threat Report shows attacks are growing. Here's a list of Symantec's recommendations to thwart risks.
The Obama Administration has unveiled a "digital government" strategy that requires federal agencies to launch new mobile applications. The strategy calls for standardized implementation of privacy controls.
Imagine a computer network that can fool intruders into seeing configurations that in reality don't exist, making it hard for them to invade the system. That's what Scott DeLoach is trying to figure out how to do.
Hacktivist attacks will increase, and researcher Gregory Nowak says organizations can take proactive steps to reduce exposure and protect brand reputation. Why, then, are many organizations failing?
Cybersecurity threats are so great that the FBI recognizes its falling behind on them. What must be done to contain the flood of cyber criminals? FBI cybersecurity leader Steve Chabinsky offers ideas.
As federal authorities ponder how to ensure health information exchanges follow the same "rules of the road," observers are debating whether the proposed voluntary compliance with guidelines will prove effective.
The Federal Bureau of Investigation warns of a scheme involving pop-up windows through which fraudsters trick travelers into installing bogus software updates. The "updates" are really malware installations.
Some of the most-connected people in D.C.'s cybersecurity community never heard of Michael Daniel, who will succeed Howard Schmidt when he retires as White House cybersecurity coordinator. Here's the skinny on Daniel.
The Department of Homeland Security has issued a report on the risks involved in using wireless medical devices and other mobile technologies in healthcare and the best practices for mitigating threats.
From mobile and the cloud to DDoS attacks and risks surrounding big data, what should banks and credit unions do now to mitigate exposure? Gartner's Anton Chuvakin offers his top recommendations.
A U.S. appellate court decision in a case involving a jail term for a HIPAA violator offers an important reminder of the potential consequences for accessing patient records without a valid reason.
Michael Daniel, who as chief of the White House budget office's intelligence branch has extensive background in IT security, will replace Schmidt as cybersecurity coordinator.
Utah Gov. Gary Herbert has taken several steps in the wake of a hacker attack against an unencrypted server that exposed state health department information on 780,000 individuals. Experts assess whether the steps are the right moves.
How much card fraud can issuers link to the breach at Global Payments? Some sources suggest as many as 7 million payment cards may have been exposed, but how can they be so sure?
Comments are due June 14 on preliminary plans for voluntary national standards, including privacy and security guidelines, for health information exchanges.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.