A California court has given final approval for a settlement in a consolidated class action lawsuit against the insurer Health Net related to a 2011 breach that affected about 2 million individuals. Find out the terms of the settlement.
Leading this week's industry news roundup, Quantum Corp. is integrating its StorNext scale-out storage with the FireEye network forensics platform, while CARD.com is partnering with IDology to help prevent card fraud.
Point-of-sale retail breaches are the rage, but they are just one cyber-crime trend on the mind of RSA researcher Uri Fleyder. What are the malware and mobile threats that organizations should monitor?
A consolidated class action lawsuit against Sutter Health related to a breach impacting more than 4 million individuals has been dismissed. The decision follows a number of other recent dismissals of similar healthcare data breach suits.
Johns Hopkins Health System has agreed to a $190 million settlement in a privacy violation case that involved a physician using a pen-like camera to secretly photograph female patients. Learn what the organization is doing to prevent other privacy incidents.
The EU Joint Cybercrime Action Taskforce pilot is set to coordinate cross-border investigations - across Europe, the United States and beyond - into cybercrime, including payment card fraud, DDoS attacks and malware rings.
A challenge examiners face in conducting forensic investigations in the cloud is that they don't have access to the servers. That's just one problem the National Institute of Standards and Technology is addressing.
A former payroll specialist at a Wisconsin healthcare provider has been sentenced to seven years in prison in connection with an ID theft scheme that involved using personal information about employees to make unauthorized money transfers to her bank account.
A controversial U.K. "emergency" surveillance bill has become law, just seven days after being introduced to Parliament. But a privacy rights group has already promised to challenge the new law in court.
Two zero-day vulnerabilities reportedly were exploited by the attackers who hacked NASDAQ's systems in 2010. While a senior U.S. legislator claims the hackers had "nation-state" backing, security experts say it's still not clear who hacked NASDAQ or why.
Healthcare IT security experts weigh in on whether the new alliance of IBM and Apple could potentially help transform the iPhone and iPad from favorite personal devices used by clinicians to enterprise-sanctioned, secure mobile platforms.
From Neiman Marcus to P.F. Chang's, 2014 has shaped up to be the 'Year of the Data Breach.' What lessons can be gleaned from the trenches of breach investigation? Experian's Michael Bruemmer shares tips.