Imagine a computer network that can fool intruders into seeing configurations that in reality don't exist, making it hard for them to invade the system. That's what Scott DeLoach is trying to figure out how to do.
Hacktivist attacks will increase, and researcher Gregory Nowak says organizations can take proactive steps to reduce exposure and protect brand reputation. Why, then, are many organizations failing?
The UK Information Commissioner's Office has fined Central London Community Healthcare NHS Trust £90,000 for a breach involving patient lists repeatedly faxed to the wrong recipient.
From mobile and the cloud to DDoS attacks and risks surrounding big data, what should banks and credit unions do now to mitigate exposure? Gartner's Anton Chuvakin offers his top recommendations.
A U.S. appellate court decision in a case involving a jail term for a HIPAA violator offers an important reminder of the potential consequences for accessing patient records without a valid reason.
New alerts from Visa and MasterCard suggest that the breach at payments processor Global Payments Inc. dates back to January 2011 - an exposure window significantly longer than what was originally reported.
Utah Gov. Gary Herbert has taken several steps in the wake of a hacker attack against an unencrypted server that exposed state health department information on 780,000 individuals. Experts assess whether the steps are the right moves.
Personal information for more than 700,000 home care providers and recipients was lost in the mail, according to the California Department of Social Services.
How much card fraud can issuers link to the breach at Global Payments? Some sources suggest as many as 7 million payment cards may have been exposed, but how can they be so sure?
Factors driving up the index vary from month to monthly, but the clear takeaway of the survey of IT security practitioners is that they're getting more apprehensive about safeguarding IT.
A laptop stolen from an employee of Accretive Health last year was not encrypted "due to the oversight of an individual IT employee," the company says in a 29-page comment letter sent to Sen. Al Franken, D-Minn. That employee subsequently was fired, the company reports.
When breaches occur, most organizations struggle to collect the right data and get investigations off the ground. How can breach response improve? Verizon's Chris Novak offers expert advice.
A new guide from federal regulators on key privacy and security issues to address when adopting electronic health records is valuable. But additional guidance on risk assessments and other issues is needed.
The lack of common definitions, understandings and approaches among countries may hamper international cooperation on cybersecurity, a need acknowledged by most countries.
Application security is driving demand for highly skilled consultants. It's a challenging profession, and I've broken out five key skills that will distinguish you in the field.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.