Two critical steps that banking institutions need to take in 2014 to help prevent fraud are implementing big data analytics and adopting far more sophisticated customer and employee authentication, says Gartner analyst Avivah Litan.
In an effort to combat medical identity theft and healthcare fraud, the Department of Veterans Affairs is issuing new ID cards to millions of vets. But do the new cards go far enough in enhancing security?
The Office of the National Coordinator for Health Information Technology has issued a proposal for an interim, updated edition of HITECH Act electronic health record software certification criteria, including privacy and security components.
Dan Clements of IntelCrawler, the research firm that claims it traced malware apparently used in the Target breach and other retailer attacks, outlines steps merchants, banks and others should take to secure their networks.
Our third annual Healthcare Information Security Today Survey reveals the top challenges that healthcare organizations are facing in complying with the HIPAA Omnibus Rule. Find out what issues are proving most difficult to address.
Leading this week's industry news roundup, IBM introduces forensics software designed to retrace actions of cybercriminals. Also, ThreatMetrix announces frictionless context-based authentication, and more.
Distributed generation and plug-in motor vehicles are among the emerging security challenges to the smart grid. In an RSA 2014 preview, Gib Sorebo of Leidos discusses the threats to utilities and consumers.
Many security incidents that affect the nation's critical infrastructure go unnoticed due to a lack of sufficient detection or logging capabilities, according to a new report, which calls for enhanced monitoring and reporting of incidents.
A law firm has developed a free iPhone app, Data Breach 411, to help organizations with breach notification compliance. The app provides links to 46 state data breach notification laws, relevant federal statutes and other resources.
You'd think that preventing damage caused by cyber-attacks would be incentive enough to get organizations to adopt cybersecurity best practices. But the government is working with industry to develop incentives to encourage adoption.