From point-of-sale hacks to malware and DDoS attacks, the top cyberthreats of 2012 have been aggressive and strong. Is it time for organizations to adopt a "hack back" strategy against perceived attackers?
In this week's breach roundup, read about the latest incidents, including three healthcare breaches involving missing devices. The largest affected 116,000 patients served by Alere Home Monitoring in Waltham, Mass.
Several legal experts say new federal guidance fleshes out details about how healthcare organizations should de-identify patient data aggregated for research. But one privacy advocate says the guidance is inadequate.
Inspector General Patrick Malley deems as inadequate the existing approach to state IT security governance that resulted in a breach last summer of a Department of Revenue tax system, which exposed the Social Security numbers of nearly 4 million taxpayers.
McAfee CPO Michelle Dennedy and Intel CISO Malcolm Harkins work for the same company, but in some ways they are worlds apart. How must privacy and security leaders bridge gaps to face challenges ahead?
"Accessing medical records [should be] as easy as accessing banking records today," says Farzad Mostashari, M.D., national coordinator for health IT, addressing a hearing on patient ID authentication.
President Obama has proclaimed December as Critical Infrastructure Protection and Resilience Month, and is using that declaration to continue his campaign to get Congress to enact comprehensive cybersecurity legislation.
The leaders in Congress on cybersecurity matters are the chairs of the committees that have jurisdiction over IT security. In both houses, chairmanship changes mean new lawmakers will lead legislative initiatives on cybersecurity in the 113th Congress.
Ethical hacker Barnaby Jack says healthcare organizations and manufacturers can take steps to minimize medical device security and safety risks. Find out his recommendations.
South Carolina's Revenue Department went nearly a year without a chief information security officer before its tax system was hacked this summer. The agency's chief says the state couldn't find a qualified candidate for the job that pays $100,000 a year.
The HHS Office for Civil Rights has released long-overdue guidance on how to de-identify patient data for use in research in accordance with the HIPAA Privacy Rule. Find out what's in the guidance.
Developing a bring-your-own-device
policy that's well-integrated with an organization's overall information security strategy requires a multi-disciplinary, collaborative approach, says attorney Stephen Wu.
Comments are being accepted through Jan. 14, 2013, on potential privacy and security requirements to be included in the meaningful use rule for Stage 3 of the HITECH Act's electronic health record incentive program.
The goal is admirable: Eliminate all traces of online information about an individual if that's what he or she wants. But is the right to be forgotten an impossible dream?
A long-delayed omnibus package of regulations, including modifications to the HIPAA privacy and security rules, remains tied up in government limbo. When might the new rules be released?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.