Open enrollment season for Obamacare as well as employer-offered health insurance is prime time for phishing scams, so it's urgent to remind consumers about the risks, security experts say.
A new Ponemon Institute study shows the average annual cost of cybercrime for 60 major U.S. companies rose 26 percent this year. Find out some of the factors contributing to the rising cost.
When it comes to finding CISOs and other security experts for healthcare organizations, recruiters frequently are looking to those working in other sectors. Find out why - and what skills are in demand.
Mitigating card risks associated with retail malware attacks and POS vulnerabilities is a focus of updates to the PCI Data Security Standard, say Bob Russo and Troy Leach of the PCI Security Standards Council.
Privacy and security leaders describe their HIPAA Omnibus compliance journeys and last-minute tasks before the Sept. 23 enforcement deadline. They outline their biggest headaches and offer insights.
In response to today's cybersecurity challenges, Southern Methodist University has selected Frederick Chang to head a new program that will address top issues - including how to fill the skills gap.
Termination of an employee after a breach should be reserved for repeat offenders, individuals who show a total disregard for the rules, those who seek to harm another or the most egregious incidents, security expert Mac McMillan contends.
The House Intelligence Committee warns of threats Chinese chips pose to American IT systems. A new film embellishes that danger. Though pure fiction, the plot could help raise the public consciousness about cyberthreats.
Lee Kim, the new director of privacy and security at HIMSS, says keeping track of where sensitive data is located, detecting breaches and dealing with insider threats are among the most critical issues.
What do TV's The Big Bang Theory, the computer game Call of Duty and traveling have in common? They're the top leisure pursuits enjoyed by IT security professionals. But what are other common attributes?
What is it going to take to address current and future IT security staffing needs? One answer: Attracting young, bright minds that are up for the challenges ahead, says USC's Winnie Callahan.
A judge finds WikiLeaks leaker Bradley Manning not guilty of aiding the enemy but convicts him on other charges. How will the mixed verdict sway NSA whistleblower Edward Snowden's decision on whether to remain on the lam?
White hat hacker Barnaby Jack, who passed away July 25, will be remembered for his demonstrations that dramatically spotlighted the vulnerabilities of ATMs and medical devices.
IT security pros see metrics as a useful tool to validate operational performance. But many organizations' top leaders evaluate security on cost. It's time to bridge that gap.
There's been a lull in big healthcare data breaches hitting the federal "Wall of Shame" tally so far in 2013. But that will likely change soon. Find out why.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.