How can organizations mitigate increasing cybersecurity risks posed by hacktivist groups and organized crime? Verizon's Chris Porter offers recommendations.
Four recent breach incidents, including one affecting LinkedIn, have put the spotlight on the effectiveness of hashing. Why is hashing increasingly ineffective at protecting online passwords?
LinkedIn, the social network that's investigating the pilfering of nearly 6.5 million of its members' passwords, has neither a chief information officer nor chief information security officer.
If you'd like to avoid being subjected to a federally mandated biennial data security audit for the next 20 years, you might want to make sure no one in your organization is using peer-to-peer networks.
With an increase in state-sponsored hacking, Google says it will alert a select subset of its Gmail e-mail users when it believes their accounts may have been targeted.
LinkedIn has confirmed that a breach of its network compromised hashed passwords associated with accounts. Security experts speculate that e-mail addresses also could be vulnerable.
Brighton and Sussex University Hospitals NHS Trust is appealing a £325,000 fine for a breach involving hard drives containing healthcare information on tens of thousands of individuals that were sold on the Internet.
The time to select a breach resolution vendor is before you need one, stresses security specialist Robert Peterson. So what questions should organizations ask when choosing a vendor?
Expectations clashed with reality during Howard Schmidt's 28-month tenure as the White House's first cybersecurity coordinator, a job he is slated to leave in mid-June.
Yet another high-profile breach involving a stolen unencrypted laptop is prompting Sen. Al Franken, D-Minn., to consider whether the nation needs an encryption mandate for healthcare information.
An attack on the Thrift Savings Plan exposed personal details about more than 120,000 federal pension participants. Learn why one expert says the breach could have serious long-term implications.
Israel is being blamed - or, perhaps, taking credit - for the creation of Flame, the sophisticated cyberspyware that has targeted organizations in the Middle East, especially its mortal enemy, the government of Iran.
It's been six years since the Department of Veterans Affairs experienced a huge breach. What breach-prevention steps has the VA taken since then, and what's left to be done?
A Massachusetts hospital that reported a 2010 breach involving lost backup tapes with information on 800,000 individuals has agreed to pay a $475,000 penalty to settle a state attorney general's HIPAA lawsuit.
Imagine a computer network that can fool intruders into seeing configurations that in reality don't exist, making it hard for them to invade the system. That's what Scott DeLoach is trying to figure out how to do.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.