North Korean leader Kim Jong-un was set to star in a satirical video game, in which he battled the forces of imperialist oppression with the help of unicorns and narwals - until hackers apparently disrupted game development.
The sentencing of a former Alabama hospital worker to two years in prison for his role in an ID theft incident that resulted in tax refund fraud, and a related class action lawsuit, illustrate that insider threats are a major ongoing challenge, two privacy experts say.
What steps can organizations take to mitigate insider fraud threats? Michael Theis of Carnegie Mellon, a featured speaker at ISMG's upcoming Fraud Summits in Toronto and London, explains why using data analytics is key.
Memorial Hermann Health System is notifying approximately 10,600 patients of an insider breach that spanned nearly seven years and involved improper access to electronic medical records.
To prevent privacy breaches involving social media, healthcare entities and their business associates need a solid plan that includes comprehensive policies and lots of communication and training.
News about the existence of a new government leaker exposing national security documents shows that - even one year after Edward Snowden - organizations still don't have a handle on the insider threat.
The U.S. Department of Veterans Affairs has launched a new security awareness campaign to help veterans prevent, detect and respond to identity theft. VA CISO Stan Lowe offers details about the program.
U.S. officials have confirmed the existence of a new leaker exposing national security documents, CNN reports. The leak apparently involves documents prepared by the National Counterterrorism Center.
A lawsuit filed in an ongoing dispute between a Connecticut community health center and its former IT director over an alleged data security breach reveals more details about the issues involved.
Effective risk management requires involvement of an organization's top leader; the resignation of Eric Shinseki as secretary of Veterans Affairs means that the VA likely will continue to struggle to comply with federal requirements for IT security.
A multi-layered approach known as "context-aware security" is the most effective strategy for fighting both insider and external cyberthreats, says Gartner analyst Avivah Litan, who explains how this strategy works.
A data breach involving an insider at UMass Memorial Medical Center, which may date back a dozen years, illustrates how difficult it can be to detect inappropriate access to patient records. Find out what tips security experts offer.
The recent Verizon Data Breach Investigation Report notes more than 16,000 incidents in the past year where sensitive information was unintentionally exposed. "Nearly every incident involves some element of human error," the report notes.
There's a ton of event content to choose from at Infosecurity Europe 2014, which runs from April 29 through May 1, and here are some of the sessions that caught one editor's eye.
Eight defendants have been charged in an alleged identity theft fraud scheme involving the theft of personal information from a call center for use in unauthorized wire transfers and to obtain payment cards.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.