A breach potentially affecting hundreds of thousands of individuals insured by Horizon Blue Cross Blue Shield of New Jersey offers more proof that physical security is no substitute for encryption.
Mobile security is no longer about managing devices, says Ian McWilton of Moka5. The real trick is to secure corporate assets through containerization solutions that reduce costs and improve user experience.
The partial takedown of ZeroAccess, one of the world's largest botnets, is an example of the role that collaboration between business and law enforcement can play in battling cybercrime.
Federal regulators plan to give healthcare providers an extra year to comply with requirements, including enhanced privacy and security measures, for Stage 2 of the HITECH Act electronic health record incentive program.
The IRS system that would allow eligible taxpayers to use refunds to help pay for health insurance under the Affordable Care Act wasn't built to detect fraud, a just-issued audit reveals.
As security leaders continue to have a growing influence with C-suite executives and boards of directors, they need to overcome communication challenges, says IBM's David Jarvis.
The Department of Health and Human Services should make several revisions in its plans for a revamp of the HIPAA accounting of disclosures rule and conduct pilot tests before implementing a final rule, an advisory panel recommends.
Hackers have pilfered some 2 million user passwords and credentials for Facebook and other social media and Internet sites, according to IT security provider Trustwave. The hackers attacked computers in about 100 nations.
The latest FISMA audit of the Department of Homeland Security furnishes fodder for both sides of the argument over whether Congress should codify Obama administration actions that have granted DHS sway over other federal civilian agencies.
The privacy and security risks posed by the Internet of Things will pose a growing challenge for IT security professionals who manage online transactions and relationships, says ISACA's Robert Stroud.
Akamai's acquisition of DDoS mitigation provider Prolexic Technologies is a sign of how the DDoS-defense marketplace is maturing at a time when attacks are becoming more sophisticated.
A major breach affecting thousands of University of Washington Medicine patients highlights the need for organizations to safeguard sensitive data from malware. Find out what steps experts recommend.
Obama administration officials say hundreds of technical issues have been ironed out of the federal HealthCare.gov site, but have all of the security concerns been adequately addressed and tested?
To improve cyberthreat and cybercrime information sharing, law enforcement officials and business leaders need to develop better working relationships, says federal prosecutor Erez Liebermann.
Three recent privacy incidents at health insurance exchanges, including one in Vermont, involved consumers getting the wrong person's data. Privacy experts offer insights on lessons learned.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.