Yi-Kai Liu, a computer scientist at NIST, explains how he's attempting to use quantum physics to devise a way to create a one-shot memory device that could help secure, for example, transactions or administrative passwords.
Two Stanford University researchers are conducting a study using crowdsourcing to show that the NSA's culling of telephone metadata can reveal a lot about an individual. I joined the crowd to find out what the metadata says about me.
In the face of evolving threats and actors, traditional ID security strategies have been proven inadequate, says Entrust's David Rockvam. It's time for a security evolution.
Many healthcare entities and business associates are average at best in their information security efforts. Other are failing. See what they're doing wrong, and how they can improve their grades.
Target has responded to allegations that it failed to heed an early malware alert before its massive data breach. Experts analyze the very latest developments.
Almost 70 percent of healthcare organizations participating in a new survey say that Obamacare increases risks to patient privacy and data security. Learn about other top security concerns.
In a preliminary step toward enactment of a new EU data protection law, the European Parliament on March 12 approved a draft proposal for a comprehensive overhaul of the EU's 1995 data protection directive.
To help the healthcare sector better understand the cybersecurity issues it faces, the Department of Health and Human Services and HITRUST are partnering to provide monthly cyberthreat briefings.
Having cyber-responders from various civilian agencies located on the same campus should help foster new ideas to battle threats to critical government and private-sector IT systems, a top administration official says.
At his March 11 Senate confirmation hearing, Navy Vice Adm. Michael Rogers, chosen by President Obama to be the next director of the National Security Agency, declines to characterize NSA leaker Edward Snowden as a traitor.
Disclosing that it fulfilled only 11 percent of the requests for customer information from U.S. law enforcement agencies during the second half of 2013, Microsoft reiterates its call for an international framework that protects customers' rights.
What are the top 20 books that all cybersecurity professionals should read? Rick Howard of Palo Alto Networks discusses his effort to develop a "Cybersecurity Canon."
A new government watchdog report says dozens of high-risk security vulnerabilities found in information systems at 10 state Medicaid agencies should serve as a warning to other states about the need to take action to prevent fraud.
A federal advisory panel has prepared recommendations for security and privacy best practices to use when a patient's representative, or proxy, is authorized to view, download or transmit electronic health records, such as through a portal.
Healthcare organizations can now take advantage of a growing number of resources offering guidance on improving medical device security. Learn about the latest security assessment framework that's now being tested.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.