Attacks are more frequent, severe and complex. How can security pros defend against the entire attack continuum - before, during and after? Cisco's Bret Hartman describes a threat-centric approach.
Two zero-day vulnerabilities reportedly were exploited by the attackers who hacked NASDAQ's systems in 2010. While a senior U.S. legislator claims the hackers had "nation-state" backing, security experts say it's still not clear who hacked NASDAQ or why.
A security expert and average consumers respond differently to the eBay breach. As most customers retain a high degree of faith in online merchant security, the expert believes eBay committed a serious sin in its lack of strong authentication.
It's unlikely that the downing of a Malaysian airliner by an anti-aircraft missile over Ukraine and the air and land battles in Gaza could expand into a cyberwar. Here's why.
From Neiman Marcus to P.F. Chang's, 2014 has shaped up to be the 'Year of the Data Breach.' What lessons can be gleaned from the trenches of breach investigation? Experian's Michael Bruemmer shares tips.
Online retailer eBay is feeling the impact of its early 2014 breach where it hurts the most: in its coffers. Recovery "will take longer and cost more," CEO John Donahoe says.
Prosecutors in Texas have taken the rare move of pursuing criminal charges against an individual for alleged HIPAA violations. The case is a reminder that health workers can face prison time and hefty monetary fines for wrongful disclosures of PHI.
If New York State is illustrative of a national trend, hacking poses a greater threat to businesses and other organizations than other types of data breaches.
Does cheap labor allow Chinese hackers to troll one website after another until they find something of interest? Times could prove tough for hackers trying to make an 'honest' day's wage.
Recent dismissals of two class action lawsuits related to an Advocate Health Care data breach spotlight how difficult it can be for plaintiffs to prevail in cases where there is no evidence of damages. But some changes might be on the way.
Canadian authorities are investigating whether a hacker or healthcare insider used a physician's credentials to gain unauthorized access to a British Columbia prescription information network, accessing information on 1,600 patients.
Enterprises should test the processes they establish to respond to advanced persistent threat attacks, just as they vet their business continuity plans, ISACA International President Robert Stroud says.
It's hurricane season, but natural and man-made disasters can happen anytime. Unfortunately, healthcare organizations are often unprepared for how to rebound so their data operations continue to run smoothly and securely in the wake of a crisis.
Three Chinese nationals seeking to make "big bucks" broke into the computers of Boeing and other military contractors, stealing secrets on transport aircraft, a U.S. criminal complaint says. Read how they allegedly did it.
The Department of Homeland Security confirms that "a potential intrusion" of the Office of Personnel Management's network occurred in March but says officials have not identified any loss of personally identifiable information.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.