Federal regulators are considering whether data segmentation technology that protects sensitive patient information when it's exchanged should be required for electronic health record software certified for the HITECH Act incentive program.
Leading this week's industry news roundup, FireEye has announced plans to acquire nPulse Technologies, which offers a network forensics solution, while CA Technologies joins the FIDO Alliance, which is developing authentication standards.
With a second House panel approving the USA Freedom Act, Congress moves a step closer to sending the president a bill to limit the government's bulk metadata collection program, the Center for Democracy and Technology's Harley Geiger says.
"Security as a business enabler" was the mantra echoing through the recently concluded 2014 Infosecurity Europe conference in London, a message that should have been heeded by top executives at retailer Target last year.
Federal regulators have issued a $4.8 million sanction, the largest HIPAA settlement to date, against two partnering New York healthcare organizations following a breach affecting just 6,800 individuals. Learn the details behind the tough penalty.
A data breach involving an insider at UMass Memorial Medical Center, which may date back a dozen years, illustrates how difficult it can be to detect inappropriate access to patient records. Find out what tips security experts offer.
As the number of cybersecurity incidents increase, departments and agencies are doing a better job of complying with the law that governs IT security in the U.S. federal government, a new report to Congress from the White House says.
An FTC administrative judge ruled that the agency must testify about the data security standards it used to pursue enforcement action against LabMD after alleged data security incidents. Experts weigh in on the potential impact of the ruling on others.
Too many organizations have a device-centric BYOD policy that fails to look at big picture issues, including building a comprehensive strategy for protecting corporate information no matter how it's accessed, says Ian Evans of AirWatch.
As members of the workforce increasingly rely on mobile devices to access corporate data, secure sharing of files becomes more challenging, says Accellion's Vidhya Ranganathan, who describes an effective strategy.