The U.S. migration from magnetic-stripe payment cards to EMV-compliant cards is in full swing, thanks in part to massive breaches at retailers. This infographic offers a timeline of progress in implementing this new technology.
Information security experts are calling on Google to rethink its patch priorities after it declines to fix a critical component that runs on Android 4.3 "Jelly Bean" and older devices, leaving an estimated 930 million mobile devices at risk.
President Obama's call for enactment of a national data breach notification law has been widely welcomed by business groups and privacy advocates, but their endorsements come with a big proviso: What's in it? The White House hasn't furnished details.
To help protect health data as cyberthreats evolve, healthcare CIOs must roll out a "blended strategy" for security, says Charles Christian, new chairman of the College of Healthcare Information Management Executives, an association of CIOs.
A new law in New Jersey, enacted in reaction to data breaches, requires health insurers that provide coverage in the state to encrypt personal information, going beyond the addressable requirements of HIPAA.
U.S. Central Command's Twitter and YouTube accounts were hacked Jan. 12, reportedly by ISIS sympathizers. The account compromises came the same day President Obama proposed new cybersecurity measures, including a national breach notification law.
Following the Paris attacks, Britain's prime minister hopes to reintroduce a controversial surveillance bill known as the "Snooper's Charter." Meanwhile, many European countries - and the U.S. - plan to increase anti-terrorism collaboration.
The Paris terrorist attacks could make it more likely Congress will renew the USA Patriot Act and less likely that lawmakers will curtail a program to collect metadata on telephone conversations of Americans.
Healthcare organizations looking for help building an integrated approach to privacy and security compliance will soon have a new tool available. Find out the details about an updated framework from HITRUST.
The FBI has attributed the Sony hack to North Korea, in part by analyzing the messages left by the "G.O.P." attackers. But linguistics expert Shlomo Engelson Argamon says the messages appear to have been written by native Russian speakers.
In the wake of the Paris massacre, the head of Britain's MI5 domestic intelligence agency has called for new powers to fight extremism, warning that as terror plots increase, communications-interception capabilities are decreasing.
Nobody wants to be a cyber-attacker's first victim. But there are benefits to being second or third, says Akamai's Mike Smith. Then you get to enjoy the true benefits of the oft-discussed information sharing.
The rapid rise in cyber-attacks on healthcare organizations necessitates the use of a cyber-centric risk management framework. Recent incidents, including the hacking attack on Community Health Systems, show healthcare is an easy target.
Leading this week's industry news roundup, BAE Systems launches a corporate security analysis service to assist companies with social risk monitoring, while Arbor Networks appoints its first chief technology and security officer.
FBI Director James Comey's Jan. 7 defense of the bureau's attribution of the Sony Pictures hack to North Korea hasn't silenced many information security experts, who argue that the scant evidence divulged to date proves nothing.