Finding a common theme from the Black Hat USA conference isn't easy, but a few emerged - simplifying complexity and developing community-based solutions - from sessions and discussions with top cybersecurity experts.
Some leading U.S. healthcare CIOs and CISOs say they are ready to handle potential crisis situations, such as treating Ebola patients, by following well-established privacy and security best practices.
With the explosion of consumer fitness devices and health-related apps, Sen. Charles Schumer, D-N.Y. wants the Federal Trade Commission to push the vendors of those products to adopt new privacy safeguards.
Cyber-historian Jason Healey contends the U.S. government does not want peace in cyberspace so it can conduct more attacks and exploitations. Instead, he says the feds should make the Internet's economic benefits its top priority.
This week's top reported breach incidents, including the report by Hold Security warning that a Russian cyber gang had breached 1.2 billion passwords, all have one thing in common: They leave numerous questions unanswered.
When patient data is used for secondary purposes, such as research, it must be de-identified. But is this process consistently reliable in protecting patient privacy? Two experts describe the challenges.