What started as an investigation of a minor breach at a county health department in Washington state has ended in a HIPAA monetary settlement with federal regulators.
Highlights at the recent HIMSS Conference included revelations about plans for resuming HIPAA compliance audits and groundbreaking discussions about medical device security issues.
If Congress fails to enact a national breach notification law, the Obama administration could develop a set of voluntary best practices along the lines of its new cybersecurity framework.
In the wake of its data breach last year, Target Corp. is overhauling its information security and compliance practices, launching a search for a new CIO and creating the position of chief information security officer.
When it comes to building a breach response team, too many healthcare organizations use a "volunteer firefighter model," taking inadequate steps to prepare for incidents, says security expert Brian Evans.
In the wake of the Target breach, the University of Pittsburgh Medical Center has ramped up Internet monitoring to detect early if the organization is a target for attacks, says John Houston, UPMC's security and privacy leader.
White House Cybersecurity Coordinator Michael Daniel assesses the cyberthreat environment facing the nation and explains what the federal government is doing about it.
In a keynote address at the RSA 2014 Conference, Kevin Mandia, founder of Mandiant, warns organizations to beware of "victim's fatigue," or letting your guard down after going six months without a breach.
Fraudsters continually find new ways to attack, but too many organizations rely on old, unsuccessful methods to detect and prevent fraud. This is the premise, says David Mattos, VP Sales, with Easy Solutions.
Verizon's annual data breach investigations report will be released in the coming weeks, offering perspective on 10 years of breach analysis, says Wade Baker, one of the report's key authors.
Proofpoint and ISMG have just completed a new Targeted Attacks survey. What are some of the key findings? Kevin Epstein shares insight on detecting advanced threats and warding off attacks.
Verizon isn't offering many details about two retailer breaches it's reportedly investigating, which may be linked to the Target breach. But IntelCrawler's Dan Clements says the merchants were likely breached several weeks ago.
While much of the security focus is on online fraud and major data breaches, organizations of all sizes and sectors are seeing a rise in phone-based fraud, says Matt Anthony of Pindrop Security.
An address by FBI Director James Comey at the RSA security conference seems to equate civil liberties and privacy. But when he offers an example of balancing Americans' rights with cybersecurity, he mainly refers to the civil liberties, not privacy.
Recent breaches tell the story: Organizations are not entirely prepared to respond to such incidents. Craig Carpenter of AccessData discusses the next generation of incident response.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.