Computer scientists at the Georgia Institute of Technology are developing new ways to apply encryption when storing or searching data in the cloud, says Paul Royal, associate director of the university's information security center.
Financial institutions and businesses in other sectors must continually collect information about their online customers to ensure stronger authentication, says Avivah Litan, a fraud expert and analyst for the consultancy Gartner.
A North Carolina state website that provides the public with transparency into government spending inadvertently listed personal data on 1,300 patients. A security expert offers insights on preventing such breaches.
HIPAA compliance training can play a critical role in preventing data breaches. Learn why a medical billing company switched to a cloud-based approach to improve training accountability, efficiency and documentation.
Although businesses understand the benefits of sharing cyber-threat information with law enforcement, they often let perceived legal constraints prevent them from collaborating, says Mary Galligan, a former FBI investigator.
Medical identity theft, an often underestimated crime, is one of the fastest growing offenses in America. It has claimed more than 1.8 million domestic victims so far this year - a 19 percent increase from 2012 - and is expected to get worse before it gets better.
Covered entities are finding it difficult to comply with a HIPAA Omnibus requirement to accommodate patients who pay cash and don't want their treatment information disclosed to insurers, says Jeff Cobb, CISO at Capella Healthcare.
Jeh Johnson, at his confirmation hearing to be the next Homeland Security secretary, pledges to fix internal cybersecurity problems at DHS before seeking further authority to have the department help other agencies get their IT security houses in order.
When it comes to safeguarding the privacy and security of healthcare information, smaller clinics, as well as patients who use telehealth technologies, face considerable challenges because of a lack of expertise, says researcher David Kotz.
Every second, 80 "things" are being connected to the Internet, and ISACA's Rob Stroud says that requires information security professionals to identify and mitigate threats, protect individuals' privacy and manage access.