A Twitter chat featuring Gartner's Avivah Litan offered a lively discussion of numerous fraud-related issues, including card breaches, weak authentication and the need for mobile scrutiny. We'll host more chats soon.
Initial reports suggested that Russian hackers could behind an attack against JPMorgan Chase, and perhaps other U.S. banks. While it's still far from clear who the culprits are, experts discuss the potential hacking motivations of a nation-state.
The workgroups that advise the Office of the National Coordinator for Health IT on privacy and security issues are shifting gears as the ONC focuses on building an interoperable, nationwide health IT infrastructure. Find out what's on their agendas.
A Google-like search engine known as ICReach has enabled government agencies to share more than 850 billion records from phone calls, e-mails and Internet chat sessions, according to a report that cites leaked documents from Edward Snowden.
Patients and healthcare providers need to recognize that Web-enabled mobile health devices that fall under the umbrella of the "Internet of Things" potentially can put personal information at risk, says Intel Security executive Greg Brown.
White House Cybersecurity Coordinator Michael Daniel is under fire for perceived 'bragging' about his lack of technical expertise. But was Daniel, in fact, bragging? And is he off base in saying his job doesn't require deep technical experience?
Apple's forthcoming iOS 8 includes a number of useful new security and privacy features, says Symantec threat researcher Candid Wueest. But there are missing features he'd still like to see implemented.
Some leading U.S. healthcare CIOs and CISOs say they are ready to handle potential crisis situations, such as treating Ebola patients, by following well-established privacy and security best practices.
With the explosion of consumer fitness devices and health-related apps, Sen. Charles Schumer, D-N.Y. wants the Federal Trade Commission to push the vendors of those products to adopt new privacy safeguards.
When patient data is used for secondary purposes, such as research, it must be de-identified. But is this process consistently reliable in protecting patient privacy? Two experts describe the challenges.