Attacks against Facebook, Twitter and other organizations over the past few months should send a message to business owners that they need to better fund cybersecurity, IT security expert Mischel Kwon says.
The federal budget sequester could impact health data privacy and security projects under way. Find out what could be cut - as well as the reaction from security experts and CISOs.
What are the common mistakes individuals in organizations make when it comes to data security and breaches? Craig Spiezle of the Online Trust Alliance provides insight from the latest research.
Organizations looking at implementing encryption should consider taking a unified approach, says Karen Scarfone, who coauthored NIST's encryption guidance. Learn about her other recommendations.
As organizations get ready to comply with the HIPAA Omnibus Rule, they also must scrutinize longstanding HIPAA compliance challenges. Experts highlight the key areas of concern.
What's the cost to an organization when it suffers a seurity breach and breaks trust with its own customers? Jeff Hudson, CEO of Venafi, presents results of a new survey on the cost of failed trust.
Venafi has just partnered with Ponemon Group to release a new survey, "The Cost of Failed Trust". Among the key...
Want to know how predictive analysis could work to defend your IT systems? Take a look at how American Navy SEALS found Osama bin Laden, says Booz Allen Hamilton's Christopher Ling.
What can organizations do to improve security after a network attack? Post-breach investigations help security leaders trace steps and strengthen weak points, says investigator Erin Nealy Cox.
Health data breaches involving the loss or theft of unencrypted computing devices are a persistent problem, according to the most recent federal statistics. A security expert offers insights and advice.
The main takeaway from a House hearing this past week was that the biggest information security problem most small business operators face is that they're unaware they have an IT security problem.
DDoS experts say three online game sites have been hit by Brobot, the massive botnet that since mid-September has been used by hacktivists to attack leading U.S. banks. What do these attacks signal?
The motive behind the cyber-attack on South Korean banks and broadcasters was atypical, as compared to most digital assaults that involve implanting malware on IT systems, says McAfee's Vincent Weafer.
How can healthcare providers help to ensure better medical device security? They need to put more pressure on device vendors at the time of procurement, says security researcher Kevin Fu.
Conventional wisdom suggests China isn't interested in disabling industrial control systems in the U.S. After all, such an act would be against its own economic interest. But is that type of thinking right?
Beyond mobile device and data security, what are the ID and access challenges facing security leaders - and how are cutting-edge organizations tackling them? CSOs Elayne Starkey and Malcolm Harkins share tips.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.