Hope springs eternal at the White House, at least when it comes to Congress passing meaningful cybersecurity legislation. Read about our exclusive conversation with a senior administration official.
White hat hacker Barnaby Jack, who passed away July 25, will be remembered for his demonstrations that dramatically spotlighted the vulnerabilities of ATMs and medical devices.
How were four Russians and a Ukrainian allegedly able to steal more than 160 million payment card numbers from corporate networks over seven years? An indictment announced by U.S. Attorney Paul J. Fishman provides details.
There's been a lull in big healthcare data breaches hitting the federal "Wall of Shame" tally so far in 2013. But that will likely change soon. Find out why.
The apparatchiks at the Kremlin think they're clever sorts with plans to replace computers with typewriters to prevent the American e-spies at the National Security Agency from hacking into Russian intelligence systems.
Angered over the Edward Snowden revelations, DEF CON says the feds should take a 'time-out' from this year's hackers' conference. But a top DHS cybersecurity policymaker says he's still invited to participate in a conclave panel discussion.
A new report shows that large data breaches in all sectors last year in California mirror a problem that keeps happening at lots of healthcare entities across the country. Find out what that problem is.
Advanced threats and mobile security were the buzzwords of the Gartner Security & Risk Management Summit. What new insights did thought-leaders share, and how can they reshape our security posture?
A breach at 97-bed Troy Regional Medical Center in Alabama spotlights why even small, cash-strapped hospitals need to ramp up their information security efforts.
When President Obama comes face to face with China's President Xi Jinping, don't expect the American commander in chief to present an ultimatum over Chinese cybersecurity assaults on critical U.S. IT systems.
Attacks aimed at mobile devices are progressing much more rapidly than any attacks ever waged against PCs. Organizations are in danger if they don't pay attention, says anti-phishing expert Dave Jevans.
Providers of technologies employees acquire through unconventional channels that could bypass their employers' supply-chain controls are known as "shadow suppliers." Here's why you should care about them.
A citizen's petition that received more than 117,000 signatures asks the White House to stop the Cyber Intelligence Sharing and Protection Act. Why does the White House response suggest a redo of last year's battle over cybersecurity legislation?
A 143-point drop in the Dow Jones Industrial Average proves the power of social media and the havoc it can cause when an account gets hacked. It's time for social media companies to tighten the authentication process.
The UK government pledges at Infosecurity Europe to help businesses improve cybersecurity. But it's going to take more than vouchers and training to address Europe's top threats to security and privacy.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.