Whether reports that the National Security Agency entered into a secret contract with security provider RSA are true or not - and RSA says they're not - the reputations of all American security vendors have been tarnished.
Was it a point-of-sale attack? A network breach? Or was it an inside job? Fraud experts disagree over the cause of the Target data breach, but they are united in how banking institutions should respond.
President Obama defends the National Security Agency's bulk-collection initiative, but suggests he may adopt some of the recommendations presented by a panel that proposes changes in the NSA's surveillance program.
In this week's breach roundup, read about the latest incidents, including the sentencing of a hacker who modified his medical college entrance exam grades and a breach affecting Colorado state employees.
An independent presidential panel makes recommendations to limit the National Security Agency's surveillance methods, including curtailing the way the government systematically collects and stores metadata from Americans' phone calls.
Karen DeSalvo, M.D., health commissioner of New Orleans, will be the next national coordinator for health IT. What privacy and security issues will she face as leader of the office that crafts guidelines for the HITECH Act's EHR incentive program?
Cyberthreats increasingly target mobile devices, and simple security measures could help end-users slash these incidents by 50 percent. This is the key finding of ENISA's new Threat Landscape Report, says Louis Marinos, the prime author.
Compliance with the HIPAA Omnibus Rule, especially when dealing with business associates, is the No. 1 challenge for healthcare CISOs in 2014, says security expert Nadia Fahim-Koster. But what are the other top challenges?
Cottage Health System in California says patient information was apparently exposed on Google for 14 months because of a lapse in a business associate's protections for one of its servers. Experts discuss the implications for the BA.
Healthcare organizations subject to an HHS fraud or breach investigation need to ensure they're prepared and can respond in a timely manner when investigators visit on-site, says former federal investigator Stephen Morreale.
Jeh Johnson, the new secretary of Homeland Security, is expected to become one of the top advocates of the administration's cybersecurity policy as the White House shifts more IT security responsibilities to DHS.