Intrusion detection is challenging for most organizations, and hackers' ever-increasing skill to evade monitoring tools only compounds the problem. But Zions Bank's Michael Fowkes says big data can help.
Be sure to look for our in-depth coverage of the HIMSS 2013 Conference, featuring insights on the HIPAA Omnibus Rule, the HITECH Act EHR incentive program and a variety of privacy and security issues.
IT security provider Mandiant issues a comprehensive report documenting how a Chinese army unit has for years been hacking into the computers of businesses and governments in mostly English-speaking nations, especially the United States.
John Pritchard, a health system security manager with extensive experience in other industries, says it's time for healthcare to apply lessons learned in other business sectors, including banking.
Highly publicized breaches at Facebook, Twitter, the New York Times and other organizations in recent weeks suggest there's a new normal in the cyberthreat arena. But the onetime head of U.S. CERT, Mischel Kwon, doesn't think so.
Malware, DDoS and mobile security aside, one of the biggest risks is organizations' lack of visibility into specific threats. Don Gray of Solutionary explains the need for actionable threat intelligence.
Organizations allowing BYOD often need to strike a balance between technology, convenience and policy enforcement. A roundtable of security experts offers insights on navigating the mobile landscape.
DHS's Bruce McConnell sees a cybersecurity framework in which the owners of critical infrastructure promise the American people they guarantee a specific level of service in the face of cyber-attacks.
Even the brightest technologists aren't immune from cyber-attacks. Just ask Facebook. The social-media company says it fell victim to a sophisticated attack in which an exploit allowed malware to be installed on employees' laptops.
As a result of the HIPAA Omnibus Rule, which broadens the number of organizations that must meet privacy and security requirements, demand for infosec pros in healthcare is higher than ever. Where is the greatest need?
The Citadel banking Trojan is now a threat to multiple sectors. And new research suggests improved monitoring is essential for the protection of critical systems and intellectual property.
The Office of the National Coordinator for Health IT is gearing up to release its first installment of voluntary health information exchange guidelines. Find out the timeline for this and related projects.
Roger Baker, CIO at the Department of Veterans Affairs, announced to his staff on Feb. 15 that he's resigning. Baker led a number of projects that dealt with security issues, including a breach prevention initiative.
Organizations typically secure data where it resides and is transmitted. Data-centric security strategies focus on securing the data itself. Mark Bower of Voltage Security explains.
Security and IT leaders, including John Halamka, are calling attention to the difficulty of complying with a HIPAA Omnibus provision about not passing along certain patient information to insurers. What are their concerns?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.