Technically savvy armed robbers who stole an encrypted laptop and smart phone from a physician who works at Brigham and Women's Hospital in Boston demanded that the doctor reveal the devices' passwords and encryption keys as well.
A former hospital CFO has pleaded guilty to submitting false documents so the medical center could receive payments from the HITECH Act EHR incentive program. Some legal experts say other federal prosecutions for HITECH Act fraud are likely.
Put together, two IRS audits illustrate a major concern many security pros have about FISMA audits: They're checklists of whether organizations comply with regulations that require specific processes but do not determine if the processes are effective.
The Walgreens case is the second state court ruling in recent weeks that calls attention to how incidents involving alleged patient privacy violations can lead to negligence lawsuits that invoke HIPAA as a benchmark.
The stiff sentence of a cybercriminal for his role in an Internet-based scheme that trafficked in hacked payment card sends a strong message about the serious nature of ID theft. But experts say more tough sentences are needed to deter fraudsters.
From PCs to tablets to smartphones, customers enter institutions from all electronic angles. And these new banking habits put new strains on traditional IT infrastructure. How can banks ensure security?
Brendan Hannigan became IBM's top security systems executive in 2011, when Big Blue acquired the company he ran, Q1 Labs. Hannigan says acquisitions will remain a key component in the growth of IBM's security business.
A Connecticut Supreme Court ruling paving the way for a case involving accusations of negligence stemming from an alleged violation of HIPAA privacy standards could potentially have an impact on data breach cases, the plaintiff's attorney says.
The loss of a server at a Visionworks optical wear retail store in Maryland offers a reminder not only of the importance of encryption but also the value of good inventory management and data disposal practices.
Organizations in all business sectors should take a series of steps to guard against "visual hacking," a low-tech method used to capture sensitive, confidential and private information for unauthorized use.