What are the strengths and weaknesses of U.S. federal security strategy? Sean Frazier of Duo Security, provides an assessment and addresses why adaptation to the cloud is paramount.
Leading the latest edition of the ISMG Security Report: A preview of our extensive coverage of the 2018 RSA Conference, which will include dozens of video interviews with thought leaders.
In this in-depth interview, Daniel Cohen of RSA discusses how open banking, also known as banking as a service, will affect the fight against fraud and offers insights on the security steps banks should be taking.
GDPR compliance. New uses for blockchain. IoT security. These are some of the hottest topics on tap at the 2018 RSA Conference, taking place April 16-20 in San Francisco.
Technology, regulations and customer expectations all have evolved. What does this mean for how organizations secure identities? Baber Amin of the Office of the CTO of Ping Identity offers strategic insight.
At the first of two Congressional hearings this week, Facebook CEO Mark Zuckerberg on Tuesday faced questions from Republicans and Democrats alike about whether the government should more closely regulate his firm and others.
As payment card fraud schemes continue to evolve, the PCI Security Standards Council has to recalibrate its standards and programs, says Troy Leach, the council's CTO, who describes three key updates.
In this era of "fake news," Time Inc. Deputy CISO Preeti Palanisamy takes seriously the challenge of maintaining the integrity of journalism from content creation through production and eventual publication.
With Alabama and South Dakota recently becoming the last two states to adopt breach notification laws, notification processes become more complicated, says privacy attorney Adam Greene, who offers an in-depth analysis.
FireEye has noticed an emerging trend: Breach investigations are increasingly prompting audits intended to ensure publicly traded companies are compliant with Sarbanes-Oxley. IT has changed dramatically since SOX became effective 16 years ago. Here's what to keep in mind.
The high-profile breaches of Fortune 100 companies are the ones that get the headlines, but small and midsized businesses should not breathe any sighs of relief. They are very much still targets, says Austin Murphy of CrowdStrike. He offers cybersecurity advice to SMBs.
The New Jersey state attorney general has smacked a medical practice with a $418,000 penalty for a 2016 HIPAA breach involving a vendor's misconfigured server. The case is the latest example of the risks posed by vendors.
Government cyber teams must adopt a modern and evolving security operations model and an analytics-driven approach to cybersecurity if they hope to keep pace with the evolving threat landscape.
Should federal regulators provide physicians with a free pass from having to conduct a HIPAA risk analysis or face a random HIPAA compliance audit if they implement a cybersecurity framework? That's what the AMA is proposing. Security experts weigh in with reactions.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.