A draft bill circulating in Congress to create national requirements for data breach notification could be the vehicle used to win support for a compromise from lawmakers supporting the divergent interests of the business community and privacy advocates.
Google has warned Google Apps administrators that their private Whois contact information has been exposed. The leak affects more than 282,000 administrators, and places them at greater risk of ID theft and spam attacks, according to Cisco.
The Senate Intelligence Committee has passed a cyberthreat information sharing bill known as CISA, but it's unclear whether it provides liability protections for businesses and privacy safeguards for citizens that would receive White House approval.
As the next wave of medical school graduates begins clinical training at healthcare organization across the U.S., it's critical these new clinicians be prepared to protect patient privacy, says healthcare attorney and professor Julie Agris.
Mattel will sell a cloud-connected $75 "Hello Barbie" doll that can "listen" to what kids are saying and talk back. But security experts warn that anything that connects to the Internet can - and will - be hacked.
The federal government plans to let businesses lead the way in creating standards for new cyberthreat information sharing and analysis organizations, much as it did when it created the cybersecurity framework.
Although breaches affecting U.S. retailers are widely reported, Verizon's new PCI Compliance Report shows increases in the theft of payment card data and other personal information span numerous industries in all international markets.
Legislation being drafted by Rep. Michael Burgess, M.D., R-Texas, proposes devising new methods to measure interoperability standards compliance by electronic health records vendors, with a goal of easing secure national data exchange.
Both Microsoft and Apple this week released patches to address the so-called "Freak" flaw in SSL/TLS. Microsoft also released a fix that addresses a failed 2010 patch for a vulnerability that was exploited by the Stuxnet malware.
During her first month on the job, former Secretary of State Hillary Clinton used a private email server that lacked a digital certificate that would have ensured encrypted and authenticated email communications, surmises security firm Venafi.
A former customer service representative at Blue Cross Blue Shield of Michigan is among 11 individuals recently arrested in connection with an alleged identity theft scheme that resulted in hundreds of thousands of dollars in credit fraud.
When IT veteran Branden Spikes founded his own company devoted to isolating browsers from attacks, he thought building the technology would be the top challenge. The venture capital community proved him wrong.
Apple has unveiled its long-awaited Apple Watch, which the company will begin shipping in nine countries on April 24. Security experts highlight the use of Bluetooth and Wi-Fi as potential security concerns and discuss other security-related issues.
West Virginia United Health System is taking a multi-step approach to thwarting insider threats, including aggressive analysis of access audits, says assistant CIO Mark Combs, who helps lead the system's privacy and security efforts.
"Align technology with businesses" is an old phrase. But information security is now part of this change, making strides to align with growth as a business enabler. Enter: the converged technology operations center.