Learn why the Department of Health and Human Services is reassessing how its many internal agencies, and the entire healthcare sector, can boost cyberthreat intelligence sharing and analysis to minimize risks.
As David Shearer steps in as the new executive director of (ISC)², he inherits a huge challenge: How does the consortium respond appropriately to the global information security staffing shortage?
The latest entrant into the password "hall of shame" is Sony Pictures Entertainment. As the ongoing dumps of Sony data by Guardians of Peace highlight, Sony apparently stored unencrypted passwords with inadequate access controls.
The National Health ISAC is making available to its members a new intelligence platform that aims to ease cyberthreat information sharing. Find out how it compares with a similar offering from HITRUST.
A top-flight IT security team requires individuals with know-how in a wide range of non-technology disciplines, in addition to those with technical expertise, cybersecurity leaders say.
Sen. Ron Johnson, R-Wis., the presumptive chairman of the Senate committee with government IT security oversight, hasn't immersed himself heavily in cybersecurity issues during his 4-year Senate tenure.
The National Institute of Standards and Technology has released a draft of guidance aimed at helping government agencies and businesses establish, participate in and maintain cyberthreat information sharing relationships.
In new guidance from the PCI Council, its leaders outline why businesses that handle card data need to address employee education. Here, experts explain why this guidance is a positive step for card security.
A settlement finalized this past week in a class action lawsuit filed in 1997 against Tenet Healthcare for a privacy breach involving thousands of patients' paper records offers important lessons for healthcare providers today.
The Information Systems Security Association will soon roll out an online tool that will generate tailored reports to guide IT security professionals in mapping out their careers.
Sophisticated threats require advanced threat protection. A threat-focused next-generation firewall must adhere to three strategic imperatives. Learn how these imperatives improve defense against advanced threats.
A bill before Congress to encourage the sharing of cyberthreat information won't come up for a vote until lawmakers act on legislation to end NSA's bulk collection program, says Senate Homeland Security Committee Chairman Tom Carper.
What advice does the first CISO have for today's security leaders? Steve Katz speaks up on top security threats, how to defend against them and what it takes to lead an effective security team.
Twitter is suing the federal government, seeking to pave the way to publish its transparency report that documents the government's requests for user information.
The Obama administration put a face - actually two faces - on a nearly half-billion-dollar program aimed, in part, at providing cybersecurity skills to the unemployed.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.