The nonstop pace of "Apple vs. FBI" updates and related crypto debates seemed to exceed both the U.S. government's and the information security industry's advanced persistent spin-cycles at this year's RSA Conference.
A laptop stolen from a locked office of an Indiana-based physician group practice may be the largest breach involving an unencrypted computing device reported so far this year. But the HHS breach tally seems to indicate that healthcare providers are making progress in preventing such breaches.
The Internal Revenue Service has temporarily deactivated an online PIN-retrieval tool meant to prevent stolen Social Security numbers from being used to file fraudulent returns after finding that hackers had successfully subverted the system.
The big-name breaches have made us all sensitive to the loss of personal and competitive data. But are we overlooking the real risks? Shawn Henry of CrowdStrike offers insight on how we need to evolve our core defenses.
Blockchain technology used by bitcoin and other cryptocurrencies offers opportunities for enhanced authentication and ID management, as well as cross-border money remittances, says Ben Knieff of the consultancy Aite. But he contends it's not clear that the technology could play a role in faster payments.
The Department of Health and Human Services has a long list of information security weaknesses, including identity and access management and incident response shortcomings, that need more attention, according to a federal watchdog agency's audit report.
Spear phishing, well-crafted socially engineered wire-transfer schemes and mobile-app overlay attacks will continue to escalate, which is why anti-phishing education is becoming increasingly critical, Dave Jevans of the Anti-Phishing Working Group says in this video interview.
The Justice Department's appeal of a court order that the government can't compel Apple to unlock an iPhone used by an accused drug dealer is significant because it sets in motion a process that could lead to a Supreme Court ruling on whether mobile device makers must give law enforcement an encryption backdoor.
A Florida-based chain of cancer treatment centers is notifying 2.2 million current and former patients of a hacker attack that potentially compromised their protected health information.
Lockheed Martin and Cybereason have partnered to help organizations respond faster to advanced threats with enhanced threat intelligence. Cybereason's Lior Div and Lockheed Martin's Richard Mahler discuss the power of their combined efforts in this video interview.
It's been a half-year now since Art Gilliland stepped into the role of CEO at startup security company Skyport Systems. What lessons has he learned from the marketplace, and where does he expect Skyport to make its mark? Find out in this video interview.
For years, Wade Baker was one of the main forces behind the industry's most noted data breach investigations report. Now, as vice president of strategy and analytics at ThreatConnect, he has the chance to practice the lessons he's learned, as he explains in this video interview.
The big companies make the big headlines, but the midsized entities are really the growing attack targets, says Dick Williams, CEO of Webroot. In this video interview, he discusses how new tools and services are serving this expanding market.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.