The Centers for Medicare and Medicaid Services says it has implemented a number of security improvements to the HealthCare.gov website and systems as it gears up to launch the second annual open enrollment for the Affordable Care Act.
The breach of an unclassified White House IT network unveiled last week is disturbing, although not surprising. But the way the Obama administration is informing Congress - and the public - about the cyber-attack is equally unsettling.
A watchdog agency says the Internal Revenue Service needs to put into place additional procedures to ensure that Obamacare health insurance exchanges safeguard consumer tax information. Learn what's recommended.
The annual Amsterdam gathering of information security aficionados detailed the very latest hacking threats, including cybersecurity attacks via drone, sniffing data from fitness devices, and exploiting ATMs using Raspberry Pi computers.
An audit last year determined that the Food and Drug Administration had security vulnerabilities on its computer network, but the agency says it has remediated the issues.
Two not-for-profit cybersecurity associations have jointly released new guidance to help manufacturers and users of medical devices running the Windows XP or Windows 7 operating systems to quickly assess the devices' security configurations.
Jocelyn Samuels, who recently became the nation's top HIPAA enforcer, is sending a strong message: Conduct a security risk analysis to help prevent breaches, or face enforcement consequences.
Coming on the heels of a Government Accountability Office report identifying HealthCare.gov security flaws, a new report by another watch-dog agency finds some security weaknesses, as well as strengths, in the Obamacare site and systems.
Federal government auditors have identified weaknesses in the technical controls protecting the security of the federally run Obamacare HealthCare.gov website and systems, which they say create increased and unnecessary risks.
Israeli Prime Minister Benjamin Netanyahu may have been a bit premature to claim Israel has deployed a cyber "iron dome" to protect its critical IT and defense systems. But a new initiative under way will try to do just that.
White House Cybersecurity Coordinator Michael Daniel is under fire for perceived 'bragging' about his lack of technical expertise. But was Daniel, in fact, bragging? And is he off base in saying his job doesn't require deep technical experience?
Cybersecurity experts raise doubts whether the National Security Agency has successfully deployed an automated hack-back system known as MonsterMind as revealed by former NSA contractor Edward Snowden.
The hacker community can be a cynical crowd, or perhaps a realistic one, that tries to make the best of the threats confronting society. CISO Dan Geer, for example, prefers to hire security folks who are, more than anything else, sadder but wiser.
Why is the National Institute of Standards and Technology developing new cybersecurity standards based on the same principles engineers use to build bridges and jetliners? NIST's Ron Ross explains.
Is having too many stakeholders who care about cyberspace's viability a hindrance to security? That's one way to interpret comments from White House Cybersecurity Coordinator Michael Daniel as he addresses the challenges of governing the Internet.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.