Symantec is revamping its security offerings, and a company executive says that the market for anti-virus apps "is dead." Security experts weigh in on the future of threat mitigation.
An FTC administrative judge ruled that the agency must testify about the data security standards it used to pursue enforcement action against LabMD after alleged data security incidents. Experts weigh in on the potential impact of the ruling on others.
Too many organizations have a device-centric BYOD policy that fails to look at big picture issues, including building a comprehensive strategy for protecting corporate information no matter how it's accessed, says Ian Evans of AirWatch.
As members of the workforce increasingly rely on mobile devices to access corporate data, secure sharing of files becomes more challenging, says Accellion's Vidhya Ranganathan, who describes an effective strategy.
Security experts say a newly reported flaw in open-source authorization services, which has been named Covert Redirect, doesn't appear to pose as big a risk as the Heartbleed bug.
IBM on May 5 announced the launch of new enterprise cybersecurity products and services to address advanced persistent threats, zero-day attacks and data breaches. Find out the latest offerings.
Gregg Steinhafel has resigned as Target CEO following a data breach last year that exposed 40 million credit and debit card accounts and personal information on 70 million customers.
Many health data breaches still go undetected and unreported, says security expert Kate Borten, who analyzes findings from the recent 2014 Healthcare Information Security Today survey.
A behavioral analysis approach to fighting malware can be more effective than a signature-based approach in the current threat environment, contends Webroot's Patrick Kennedy.
Network "situational awareness" can help organizations in all business sectors improve regulatory compliance by identifying networks and devices that need protection, says Lumeta's Reggie Best.
Voltage Security's Mark Bower contends data-centric security can help break down barriers to the widespread use of encryption and help protect sensitive information, including credit card numbers.
Cris Ewell, CISO of Seattle Children's Hospital, offers a detailed explanation of how to build an effective incident response plan - an essential component of HIPAA Omnibus Rule compliance.
On the day Target's CEO resigned in the aftermath of a massive data breach, the Ponemon Institute issued its 2014 Cost of Data Breach Study, which Chairman Larry Ponemon says helps explain why CEOs should be more involved in breach preparedness and response.
While security technologies can help safeguard systems and data, breach prevention and compliance programs also depend on workforce security awareness. Here are some simple steps to take.
A White House working group exploring big data and privacy has proposed that Congress enact a national data breach notification law and strengthen the government's role in cybersecurity.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.