A Senate panel approved a bill to strengthen e-mail privacy protections despite concerns expressed by the head of the Securities and Exchange Commission that the legislation could hinder investigations.
It isn't just the quantity of cyber-attacks that's staggering; it's the quality. The average hacker now has access to nation-state-level attack capabilities, says James Lyne of Sophos. How can organizations defend?
A 143-point drop in the Dow Jones Industrial Average proves the power of social media and the havoc it can cause when an account gets hacked. It's time for social media companies to tighten the authentication process.
The UK government pledges at Infosecurity Europe to help businesses improve cybersecurity. But it's going to take more than vouchers and training to address Europe's top threats to security and privacy.
Ignoring a White House threat to veto the Cyber Intelligence Sharing and Protection Act, the House of Representatives overwhelmingly approved the bill known as CISPA, sending the measure to the Senate.
To meet Obama administration concerns, the House sponsors of the Cyber Intelligence Sharing and Protection Act amended the bill. But a White House spokesman says those changes didn't go far enough to protect citizens' privacy and civil liberties.
The New York eHealth Collaborative is developing a national provider directory to ensure that electronic queries for patient data go to the right place and privacy is protected, says the group's leader, David Whitlinger.
Two insiders at healthcare facilities affiliated with the University of Florida have been arrested in ID theft cases. The breaches were part of a broader ID theft ring, authorities allege, and more arrests are pending.
The advocacy group Patient Privacy Rights has co-developed a "trust framework" that IT vendors and their clients can use to help measure compliance with privacy principles. But will it prove practical?
In the aftermath of a massive health data breach last year and a smaller incident this year, the state of Utah is taking a number of steps, including creating a data security office within the health department.
An advisory panel is outlining how to address privacy and security issues involved in the exchange of patient information among healthcare providers using the query and response method. How will the recommendations be put to use?