The Obama administration has issued a policy statement that says businesses sharing cyberthreat information with one another are not violating antitrust laws.
In an exclusive interview, Kevin Charest, CISO of the Department of Health and Human Services, discusses recent healthcare sector cybersecurity drills, as well as an update of HealthCare.gov security.
Having cyber-responders from various civilian agencies located on the same campus should help foster new ideas to battle threats to critical government and private-sector IT systems, a top administration official says.
White House Cybersecurity Coordinator Michael Daniel assesses the cyberthreat environment facing the nation and explains what the federal government is doing about it.
The threats, attacks and crimes don't differ greatly around the world. What does differ is how each region responds. Freddy Dezeure of CERT-EU is working to ensure that Europe is ready to respond appropriately.
An address by FBI Director James Comey at the RSA security conference seems to equate civil liberties and privacy. But when he offers an example of balancing Americans' rights with cybersecurity, he mainly refers to the civil liberties, not privacy.
Our third annual Healthcare Information Security Today Survey reveals the top challenges that healthcare organizations are facing in complying with the HIPAA Omnibus Rule. Find out what issues are proving most difficult to address.
Retail data breaches are growing. ISight Partners' Tiffany Jones, a researcher who helped the Department of Homeland Security prepare its report about malware attacks, offers new insight into the latest cyber-attacks.
In the quest to prevent data breaches, healthcare providers should take advantage of the free privacy and security resources available from federal regulators. Find out about the most popular guides offered.
The healthcare industry plans to test its cybersecurity preparedness and attack response coordination through two mock cyber-attack exercises this year. HITRUST will coordinate the drills.
Most fraud on the Internet is linked to unsecured identities, which is why a new global identification framework is needed, says Paul Simmonds, who heads a coalition working on a framework model.
To improve cyberthreat and cybercrime information sharing, law enforcement officials and business leaders need to develop better working relationships, says federal prosecutor Erez Liebermann.
Information Security Media Group is offering a growing list of fraud-fighting educational opportunities, including videos of presentations at its recent Fraud Summit plus a series of 2014 summits.
Senior leaders in business and government are buying in to the need for more cybersecurity investments as well as threat-intelligence sharing, new research shows. But why are they still struggling to hire the right security pros?
New revelations about how the National Security Agency collects and uses e-mail and instant-messaging contact lists demonstrate bad data governance practices that raise serious concerns, a leading privacy attorney says.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.