The 9/11 Commission, in its 10th anniversary report, cautions Americans and the U.S. government to treat cyberthreats more seriously than they did terrorist threats in the days and weeks before Sept. 11, 2001.
A consolidated class action lawsuit against Sutter Health related to a breach impacting more than 4 million individuals has been dismissed. The decision follows a number of other recent dismissals of similar healthcare data breach suits.
Johns Hopkins Health System has agreed to a $190 million settlement in a privacy violation case that involved a physician using a pen-like camera to secretly photograph female patients. Learn what the organization is doing to prevent other privacy incidents.
The EU Joint Cybercrime Action Taskforce pilot is set to coordinate cross-border investigations - across Europe, the United States and beyond - into cybercrime, including payment card fraud, DDoS attacks and malware rings.
A challenge examiners face in conducting forensic investigations in the cloud is that they don't have access to the servers. That's just one problem the National Institute of Standards and Technology is addressing.
Enabling the secure sharing of patient data is a key aspect of work under way to modernize the Department of Veterans Affair's VistA electronic health record system, says Jim Traficant of ASM Research, which is leading an infrastructure project.
A former payroll specialist at a Wisconsin healthcare provider has been sentenced to seven years in prison in connection with an ID theft scheme that involved using personal information about employees to make unauthorized money transfers to her bank account.
BYOD poses some of the biggest privacy and security risks facing the healthcare sector, but the efforts of the new IBM/Apple alliance could help address concerns about using personally owned mobile devices, says IBM's Dan Pelino.
A controversial U.K. "emergency" surveillance bill has become law, just seven days after being introduced to Parliament. But a privacy rights group has already promised to challenge the new law in court.
Two zero-day vulnerabilities reportedly were exploited by the attackers who hacked NASDAQ's systems in 2010. While a senior U.S. legislator claims the hackers had "nation-state" backing, security experts say it's still not clear who hacked NASDAQ or why.
Healthcare IT security experts weigh in on whether the new alliance of IBM and Apple could potentially help transform the iPhone and iPad from favorite personal devices used by clinicians to enterprise-sanctioned, secure mobile platforms.
"United we stand; divided we fall." That's the message from Art Coviello to kick off the 2014 RSA Conference Asia Pacific & Japan in Singapore. What advice does the RSA chair offer to global security leaders?