Distributed-denial-of-service attacks pose a persistent, genuine threat to all sectors. That's why we've created the DDoS Resource Center to fill the information gaps.
A unit of the U.S. Commerce Department overreacted to perceived malware infections and unnecessarily spent more than half of its IT budget to mitigate the situation, according to an inspector general audit.
Some organizations may need to reconsider how they assess whether incidents are reportable breaches under the HIPAA Omnibus Rule, explains privacy expert Kate Borten.
What are the top three cybersecurity game changers, and what negative impact can they have on organizations if security leaders do not manage them properly? Rolf von Roessing of ISACA shares insight.
A new report shows that large data breaches in all sectors last year in California mirror a problem that keeps happening at lots of healthcare entities across the country. Find out what that problem is.
Data from social media sites like Facebook, along with mobile device texts, will be analyzed by researchers in the aim of preventing suicide among U.S. Veterans. But how will privacy be protected?
Intermountain Healthcare and Deloitte Consulting have teamed up to offer a new platform for healthcare data analysis. But how are they also still ensuring they protect patient privacy?
Partners HealthCare is integrating patients' remote monitoring data from medical devices into their electronic health records. But what are the essential security steps for this project?
Reports continue to show that an overwhelming percentage of applications have serious vulnerabilities. The important takeaway here is that application security has not improved in the last 10 years.
In complying with the HIPAA Omnibus Rule, covered entities need to demand that their business associates are protecting patient information stored on mobile devices, says consultant Bill Miaoulis.
The Office of the National Coordinator for Health IT, a unit of the Department of Health and Human Services, has offered Congress a glimpse at its security and privacy priorities for next year. Let us know what you think of the to-do list.
Here are some questions we'd like to ask the former systems administrator at the National Security Agency to learn more about the motivation behind his leak of the U.S. government's top-secret information collection programs.
Distributed-denial-of-service attacks are perfect weapons for cybercriminals and political adversaries, says Prolexic's Scott Hammack, who explains why any organization with an online presence should brace itself for attacks.
Although major healthcare data breaches appear to be on the decline this year, losses and thefts of unencrypted devices continue to be a problem. Bill Lazarus of Stanford Medicine explains how his organization is tackling the issue.
Recent moves by federal agencies are finally giving medical device security the long overdue spotlight it deserves. And if you're looking for best practices, the VA has some to offer.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.