The social network Myspace has settled with the Federal Trade Commission over misrepresenting its privacy policies by sharing personally identifiable information with advertisers without first getting permission from users.
A new IBM study identifies three distinct types of information security leaders: Influencers, Protectors and Responders. Which type are you? IBM's Marc van Zadelhoff offers tips for more effective leadership.
A series of workshops will be held this summer to help build a National Healthcare Cybersecurity Response Framework, explains Deborah Kobza, who is coordinating the effort.
Even with security information and event management systems, organizations labor to separate normal log data from actionable events, according to the latest Log and Event Management Survey from the SANS Institute.
Organizations often do not detect intrusions until after they've been compromised, says Rob Lee of SANS Institute. So how should they improve their incident-response posture? Lee offers three tips.
The web-services protocol developed by the National Institute of Standards and Technology allows desktops, laptops, e-tablets and smartphones to access sensors that capture biometric data such as fingerprints, iris and face images.
The Health IT Policy Committee is seeking some modifications in the privacy and security provisions of the proposed rules for Stage 2 of the HITECH Act electronic health record incentive program.
States worry as much about responding to the hazards presented by cybersecurity attacks as they do hurricanes, according to a new report issued by the Federal Emergency Management Agency.
The information security profession is a 'war for talent' today, says recruiter Kathy Lavinder. But to win the war requires specialized skill sets. Here are today's top requirements.
Which Internet security threats pose the greatest risks to organizations in 2012 and beyond? Symantec has just released its Internet Security Threat Report, which reveals some surprising trends.
How can organizations ensure that their information security staff is mitigating the latest threats? And what truly defines an information security professional? Here are some of the key ingredients.
Voluntary national standards, including privacy and security guidelines, for health information exchanges are inching forward. Federal authorities soon will seek comments on plans for a Nationwide Health Information Network Governance Rule.
Federal authorities have charged 107 individuals, including some physicians and nurses, for their alleged participation in schemes involving $452 million in false Medicare billing.
New advisories from Visa suggest that payments processor Global Payments Inc. may have been breached in June 2011 - nine months earlier than initially reported.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.