Target now says personally identifiable information for up to 70 million of its customers was likely exposed in the December breach that also compromised some 40 million U.S. debit and credit cards.
The House of Representatives approved a bill Jan. 10 that would require notification of consumers within two days of discovery of breaches of data on Obamacare's health insurance exchanges.
In this week's breach roundup, read about the latest incidents, including a third-party billing error that exposed patient information at the University of Pennsylvania Health System.
Federal agencies audited by the Government Accountability Office showed inconsistent responses to computer breaches involving personally identifiable information.
The House of Representatives is scheduled to vote Jan. 10 on two Republican bills addressing breach notification requirements and data security for Obamacare's HealthCare.gov website and health insurance exchanges.
The North Carolina Department of Health and Human Services recently mailed almost 49,000 Medicaid ID cards to the wrong recipients, its second breach incident reported in recent months.
House Majority Leader Eric Cantor plans to push new legislation aimed at bolstering the security of the HealthCare.gov website as part of a GOP call for "greater transparency" overall for Obamacare.
As a result of high-profile breaches, such as the Target incident, security is increasingly a board issue. What are the key topics security leaders should prepare to discuss in 2014? Alan Brill of Kroll offers his forecast.
The hacking of Skype's Twitter account, Facebook site and blog serves as a reminder that organizations must diligently protect their credentials, a cybersecurity expert says.
As a result of a settlement with the FTC tied to a 2011 health data breach, Accretive Health, a billing company, must take a series of security steps to better safeguard health information.
Breach detection provider FireEye has acquired incident response and remediation services company Mandiant , forming a formidable company that can provide soup-to-nuts products and services to detect, mitigate and respond to breaches.
Days after a German newspaper reported that the NSA had compromised commercial computer hardware and smart phones for years, the agency says it, too, is concerned about the security of those products.
Buried deep within a 308-page report from a presidential panel on ways to tighten federal surveillance and IT security programs are important recommendations on how to mitigate the insider threat at federal agencies.
Many business leaders lack a clear understanding of the value of identity and access management. CISO Christopher Paidhrin offers a scenario for how to make the case for an IAM investment.
Another federal investigation of a relatively small health data breach has resulted in a financial penalty, this time for a physician group practice in Massachusetts. Find out the details behind the settlement.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.