A settlement finalized this past week in a class action lawsuit filed in 1997 against Tenet Healthcare for a privacy breach involving thousands of patients' paper records offers important lessons for healthcare providers today.
Automated attacks have potentially compromised the majority of websites that run the Drupal content management system, giving attackers platforms for launching malware, DDoS attacks and spam, according to the Drupal security team.
Air-gapped networks promise security by disconnecting PCs from the Internet. But graphics cards in malware-infected systems attached to air-gapped networks can be made to broadcast data via FM radio to nearby smart phones, researchers warn.
A House Committee chairman has issued a subpoena to former U.S. Chief Technology Officer Todd Park, calling on him to testify next month about the security of Obamacare's HealthCare.gov website and systems.
The revelation that Karen DeSalvo, M.D., head of the Office of the National Coordinator for Health IT, will be retaining her leadership role at the agency even as she takes on additional duties is raising new questions.
In this post-Target era of "It's not a matter of if, but when," how prepared is your organization for a data breach? Michael Buratowski of General Dynamics Fidelis Cybersecurity Solutions offers tips for breach planning and response.
Last week, Karen DeSalvo, M.D., was promoted to acting assistant secretary of health to help with the nation's Ebola response. This week, the Office of the National Coordinator for Health IT says she will also maintain her ONC leadership role.
The federal government's point man on the cybersecurity framework, Adam Sedgewick of NIST, responds to a critique by Larry Clinton of the Internet Security Alliance on the failure of NIST to outline the financial benefits of the framework.
As part of their breach response strategies, organizations need to establish clear guidelines in advance so they know when it's appropriate to offer victims free credit monitoring or ID theft protection services.
Information security experts say espionage-focused attackers, apparently operating from Russia, have been using phishing e-mails and malware in multi-stage attacks designed to evade detection and steal political and military secrets.
A watchdog agency says the Internal Revenue Service needs to put into place additional procedures to ensure that Obamacare health insurance exchanges safeguard consumer tax information. Learn what's recommended.