President Obama ordered increasingly sophisticated cyberattacks to cripple Iranian nuclear enrichment centrifuges as part of a major expansion of America's first persistent use of cyberweapons, according to a new report.
Yet another high-profile breach involving a stolen unencrypted laptop is prompting Sen. Al Franken, D-Minn., to consider whether the nation needs an encryption mandate for healthcare information.
Those involved in developing health information exchanges can take advantage of a new resource from the Markle Foundation offering guidance on key issues, including privacy and security.
Flame is designed to carry out cyber espionage and steal valuable information, including but not limited to computer display contents, information about targeted systems, stored files, contact data and audio conversations.
Israel is being blamed - or, perhaps, taking credit - for the creation of Flame, the sophisticated cyberspyware that has targeted organizations in the Middle East, especially its mortal enemy, the government of Iran.
The National Institute of Standards and Technology's guidance recommends how and when cloud computing is appropriate, addresses risk management issues and indicates the limits of current knowledge and areas for future research and analysis.
IPv4 - the protocol the Internet originally was built on - is quickly running out of addresses, and organizations must prepare for IPv6. What should they consider, and what steps can they take now?
It's been six years since the Department of Veterans Affairs experienced a huge breach. What breach-prevention steps has the VA taken since then, and what's left to be done?
IT risk management, cyber insurance, privacy - these are hot topics for security leaders, but not for their boards of directors. Why do senior executives still fail to see IT risks as business risks?
Why are socially engineered schemes causing so many headaches? Symantec's new Internet Security Threat Report shows attacks are growing. Here's a list of Symantec's recommendations to thwart risks.
The Obama Administration has unveiled a "digital government" strategy that requires federal agencies to launch new mobile applications. The strategy calls for standardized implementation of privacy controls.
Imagine a computer network that can fool intruders into seeing configurations that in reality don't exist, making it hard for them to invade the system. That's what Scott DeLoach is trying to figure out how to do.
Hacktivist attacks will increase, and researcher Gregory Nowak says organizations can take proactive steps to reduce exposure and protect brand reputation. Why, then, are many organizations failing?
Cybersecurity threats are so great that the FBI recognizes its falling behind on them. What must be done to contain the flood of cyber criminals? FBI cybersecurity leader Steve Chabinsky offers ideas.
As federal authorities ponder how to ensure health information exchanges follow the same "rules of the road," observers are debating whether the proposed voluntary compliance with guidelines will prove effective.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.