Following the release of a new report that analyzed how Target Corp. possibly missed several opportunities to prevent a massive data breach last year, U.S. senators grilled the company's CFO about the company's actions.
Although European Union leaders expressed concerns about the NSA's surveillance programs to President Obama, that didn't prevent the United States and EU from issuing a communique highlighting cooperation on cybersecurity.
Distributed-denial-of-service attacks are a concern for all organizations. But financial institutions face unique challenges, and so they require a unique level of protection, says Mark Byers of Fortinet.
Leading this week's industry news roundup, Blackberry receives FIPS certification for its containerization solution, while Bluefin Payment Systems and Springbook Software team up.
The No. 1 reason Congress, after five years of intensive efforts, has yet to enact comprehensive cybersecurity legislation is differences over how much liability protection to grant businesses to get them to share cyberthreat information.
After servicing three of the four largest data breaches in 2013, Experian Data Breach Resolution identified six important lessons that you may find beneficial. Here is what they learned.
Matching patients to all the right electronic records and complying with privacy rules that differ from state to state are among the toughest ongoing challenges that health information exchanges face, according to a new GAO report.
Bowing to strong public concerns about privacy, President Obama and a bipartisan group of House members separately introduced plans to eliminate the National Security Agency's bulk collection of citizens' phone records.
A report prepared for a Senate committee provides an extensive analysis of how retailer Target Corp. possibly missed several opportunities to prevent the massive data breach that compromised the credit card details of millions of customers.
Mobility has driven the rise of containerization as a security strategy for employee-owned devices. But what about for contractors? Kimber Spradlin of Moka 5 discusses how to mitigate third-party risks.
An anti-American hacktivist group calling itself Anonymous Ukraine has posted more than 7 million credit card numbers online, but it appears unlikely most of them could be used for fraud, according to the cybersecurity firm Risk Based Security.
(ISC)² is celebrating its silver anniversary as a global organization educating and certifying information security professionals. What are the key threats and trends driving the profession's future growth?
When a former U.S. president acknowledges that he won't use e-mail to correspond with foreign leaders to avoid snooping by the NSA, you know the image of America as a bastion of freedom - at least online - has dropped a few more notches.
Watch this 6-minute video highlighting what the global leader in strong authentication, RSA, has done over the years and continues to do to maintain the number-one spot in the security industry.
A free webinar will provide an overview and analysis of the results of the Healthcare Information Security Today survey, which finds that most organizations lack a documented infosec strategy.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.