Congress is demanding answers about the recent malware attacks against major retailers, and the effort has already resulted in the disclosure of more details about the Neiman Marcus breach.
From access controls to intrusion detection, mobility to privacy, healthcare organizations face unique network security challenges. Isabelle Dumont of Palo Alto Networks offers a new, unique approach.
2014 is going to be a critical year for data breach preparation and response, according to Michael Bruemmer of Experian. What are the key breach-related developments that security leaders must watch?
In 2013, attackers proved that sophisticated DDoS attacks could be launched as effective disruptions and distractions. What are the evolving solutions that now help organizations mitigate these strikes?
To avoid the risk of staff using social media to communicate about patients, healthcare organizations need to offer more secure alternatives, says security and privacy expert Andrew Hicks.
A new, free iPhone app is designed to help organizations navigate 46 state data breach notification laws as well as federal statutes, such as HIPAA, attorney Scott Vernick says.
With information freely available about anyone on the Internet, ISACA's Robert Stroud says security professionals need to better monitor and control how personal information is being accessed and used.
The healthcare industry is becoming a bigger target for cybercriminals, so cyber-attack drills planned for this year are an important step toward identifying security best practices, says Ray Biondo, CISO of insurer Health Care Service Corp.
HealthcareInfoSecurity's second annual Top 10 Influencers recognizes leaders playing a critical role in healthcare data security and privacy. Find out who's on the list.
Technology is the biggest challenge to ethics and compliance in organizations today, says Deloitte's Keith Darcy. "We have the capacity to do things before we ever consider the ethical consequences ..."
President Obama faces a dilemma in deciding whether to prohibit the National Security Agency from tinkering with encryption as one way to collect intelligence data from adversaries who threaten to harm America.
In a speech revealing new limits on the way intelligence agencies collect telephone metadata, President Obama also announced a comprehensive review of how government and business are confronting the challenges inherent in big data.
2014 is going to be a critical year for data breach preparation and response, according to Michael Bruemmer of Experian. What are the key breach-related developments that security leaders must watch?
From new malware to the Target breach, cyber-attacks reached an all-time high in 2013, says Cisco's Annual Security Report. Cyberthreat expert Levi Gundert tells how organizations can regain the advantage in 2014.
Don't miss the Jan. 24 deadline for participating in HealthcareInfoSecurity's third annual survey examining the priorities and challenges of security leaders at hospitals, clinics and health plans.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.