The partial government shutdown caused NIST to miss the deadline for publishing a preliminary version of the cybersecurity framework, but the agency expects to meet the February deadline for releasing the final version.
Citing concerns about identity theft risks, a new GAO report urges the Centers for Medicare and Medicaid Services to step up its efforts to remove Social Security numbers from Medicare beneficiaries' ID cards.
Learn why Frederick Chang, the new head of the cybersecurity program at Southern Methodist University, says the time has come to create a "science of security" that abandons the current reactive strategy.
New revelations about how the National Security Agency collects and uses e-mail and instant-messaging contact lists demonstrate bad data governance practices that raise serious concerns, a leading privacy attorney says.
In this week's breach roundup, read about the latest incidents, including two thefts of portable electronic devices exposing health information and a reminder to apply security controls to employee-owned devices.
Gen. Keith Alexander's departure from the National Security Agency has nothing to do with leaks by former contractor Edward Snowden about top-secret U.S. government programs to amass telephone and Internet records of Americans, an NSA spokeswoman says.
An audit protocol from federal regulators is a useful tool for covered entities and business associates that are conducting a risk analysis and beefing up HIPAA compliance efforts, says security expert Bill Miaoulis.
The Department of Health and Human Services and some states are still busy working out technical issues to improve the functionality of health insurance exchanges that went live under Obamacare Oct. 1.
Security teams struggling to detect signs of threats hidden in mountains of data are attracted to big data analytics. But experts advise security professionals to take an incremental approach, starting out with smaller projects.
An ENISA white paper provides guidance on securing industrial control systems and preparing an incident response plan. Learn why these systems, used in many sectors to perform repetitive automated tasks, are vulnerable to attack.
In this week's breach roundup, read about the latest incidents, including a former South Carolina state employee pleading guilty to charges stemming from a breach affecting 228,000 Medicaid recipients.