"If you talk to CSOs, they don't worry about what they know about; they worry about what they don't know about," says Jon Ramsey, CTO of Dell SecureWorks, discussing threat intelligence.
"It was purely my networking that saved us and gave us time to defend ourselves appropriately," says Abbas Kudrati of the National Bank of Kuwait, following a recent cyber incident that impacted the bank.
As part of its ongoing effort to identify privacy and security best practices for the use of mobile devices in healthcare, the Office of the National Coordinator for Health IT is soliciting comments on the issue through March 30.
Organizations are not taking the advanced persistent threat seriously enough, says Hord Tipton of (ISC)2. But security professionals also are not mitigating the common threats, he says. Watch the video.
Consumer advocate Deven McGraw describes what she likes and doesn't like about the privacy and security provisions in the proposed rules for Stage 2 of the HITECH Act electronic health record incentive program.
"People appreciate being contacted when particular transactions look risky," says Peter Tapling, President and CEO of Authentify. "Out-of-band authentication provides the opportunity to do that in real-time, at very low cost to the institutions."
Far too many identity solutions today rely on simple user names and passwords, says Brent Williams, CTO of Anakam Identity Services - the identity product line of Equifax. But the future of identity is bright, he says.
Because winning the support of CEOs for any new project requires demonstrating a return on investment, information security professionals need to more precisely quantify the potential payoff of their suggested spending on technologies and training, according to a new report.
Cybersecurity Act sponsors intensify their campaign to enact the legislation that would change the way the government protects critical federal and private-sector IT networks as a group of key Republican senators offers an alternative bill.
A total of 11 class action lawsuits have now been filed against Sutter Health in the wake of a health information breach, and those suits likely soon will be consolidated into one case, according to a news report.
Authorities link the suspects to attacks on U.S. and foreign government websites, financial services companies, government contractors and media companies.
The rapid adoption of electronic health records at physicians' offices, which are making the transition from paper to digitized records in the blink of any eye, means ensuring the security of that information is a major challenge.
What skills are needed to be an effective fraud examiner? My short answer is that, as with any discipline, there are certain skills and areas of knowledge one needs to learn to be successful.
A free report offers a detailed method for calculating the potential cost of healthcare breaches and a method for justifying an investment in data security.
The privacy profession is evolving, says Kirk Herath, Chief Privacy Officer of Nationwide Insurance. For those who are new to the role, Herath offers three pieces of advice.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.