Your organization has been attacked or threatened, and you can trace the actor. Should you "hack back" in response? Two noted information security and privacy attorneys discuss the merits of active defense.
Today's high-profile attacks have fundamentally changed the way organizations approach incident response. What are the new essentials? Ashar Aziz of FireEye leads a panel discussion on this vital topic.
The Department of Health and Human Services is working with private sector healthcare groups, such as HITRUST, to facilitate more sharing of cybersecurity threats and remedies, says HHS' CISO.
CISOs looking for a way to build credibility with senior executives - and win funding for important projects - need to drop the "just say no" approach and build a reputation as a team player, says security professor Ray Davidson.
More than merely a phishing incident, a targeted attack is part of an advanced persistent threat. How can organizations defend against these attacks? Kevin Epstein of Proofpoint offers insight.
Our RSA panel features the NIST thought-leader responsible for its information risk publications along with top IT security practitioners who take NIST guidance and make it work. See how they do it.
The number of individuals affected by health data breaches substantially declined in 2012, the federal tally shows. Find out what experts say about emerging threats for the year ahead.
How do we lessen the risks posed by mobile devices and their apps, along with direct access provided to proprietary corporate data and networks? Here are five clear, actionable ways to mitigate your risks.
HHS will provide educational tools to help healthcare organizations and their business associates comply with the HIPAA Omnibus Rule. Find out what's in the works - and when it will be available.
Be sure to look for our in-depth coverage of the HIMSS 2013 Conference, featuring insights on the HIPAA Omnibus Rule, the HITECH Act EHR incentive program and a variety of privacy and security issues.
IT security provider Mandiant issues a comprehensive report documenting how a Chinese army unit has for years been hacking into the computers of businesses and governments in mostly English-speaking nations, especially the United States.
John Pritchard, a health system security manager with extensive experience in other industries, says it's time for healthcare to apply lessons learned in other business sectors, including banking.
Even the brightest technologists aren't immune from cyber-attacks. Just ask Facebook. The social-media company says it fell victim to a sophisticated attack in which an exploit allowed malware to be installed on employees' laptops.
Healthcare organizations that allow staff members to use personally owned mobile devices for work-related purposes need to first develop a policy outlining the rules of the road, says federal privacy adviser Kathryn Marchesini.
In this week's breach roundup, read about the latest incidents, including an ID theft case at a Florida health department, and a security technology vendor hit by a breach.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.