In the aftermath of a payment card breach, as fraudsters race to exploit the stolen information, card issuers and affected customers take steps to mitigate risks. Here's a look at the lifecycle of a payment card breach from three perspectives.
North Korean leader Kim Jong-un was set to star in a satirical video game, in which he battled the forces of imperialist oppression with the help of unicorns and narwals - until hackers apparently disrupted game development.
As CEO of ForeScout Technologies, which focuses on continuous monitoring of networks, T. Kent Elliott says he has to anticipate the next generation of vulnerabilities. So what's the most significant emerging risk? The Internet of Things.
It's been a year since the Target breach called attention to the need to ramp up cybersecurity at U.S. retailers. Here's a look at seven important lessons learned since then.
Organizations in all business sectors should take a series of steps to guard against "visual hacking," a low-tech method used to capture sensitive, confidential and private information for unauthorized use.
Troy Leach of the PCI Security Standards Council says log monitoring is an effective data breach detection tool that, unfortunately, not enough merchants put to use. He explains how upcoming PCI guidance could help with implementation.
As part of their breach response strategies, organizations need to establish clear guidelines in advance so they know when it's appropriate to offer victims free credit monitoring or ID theft protection services.
The California Supreme Court has declined to hear appeals in two healthcare data breach lawsuits in which there was no clear proof medical data was actually inappropriately viewed.
Yet another California healthcare breach-related lawsuit - this one involving Alere Home Monitoring - has been dismissed because of the lack of proof that anyone actually viewed data stored on an unencrypted computer device that was stolen.
You need to combine IT security knowledge with business acumen if you want to find yourself among the ranks of chief information officers and other high-level positions. Here's how privacy can help.
For up to seven months, some 51 UPS Stores in 24 different states were infected with POS malware that intercepted 105,000 transactions, affecting an unknown number of customers.
Some leading U.S. healthcare CIOs and CISOs say they are ready to handle potential crisis situations, such as treating Ebola patients, by following well-established privacy and security best practices.
Vendors are rushing useful new "Internet of Things" products to market, but too often treat device security and data privacy as an afterthought, says Forrester Research analyst Andrew Rose.
Riverside Health System is notifying 2,000 cancer patients about a breach that involves alleged identity theft. It's the second security incident involving an insider at Riverside since last December.
A California court has given final approval for a settlement in a consolidated class action lawsuit against the insurer Health Net related to a 2011 breach that affected about 2 million individuals. Find out the terms of the settlement.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.