What are the top account takeover threats to banking institutions in 2013? Ken Baylor of NSS Labs discusses Zeus variants, mobile malware and how institutions can protect themselves from fraudsters....
In light of growing threats and the increasing complexity of information technology, organizations must get everyone in the enterprise, especially top leaders, involved in assessing and managing information risk.
To mitigate the top threats for 2013, organizations need to understand the motivations of potential attackers so they can adequately defend their networks and systems. Experts describe risk management strategies for the year ahead.
To acknowledge leaders who are playing a critical role in shaping the way healthcare organizations approach information security and privacy, HealthcareInfoSecurity announces its inaugural list of Influencers.
With HIPAA compliance audits slated to resume within about a year, what steps can healthcare organizations take to begin to prepare? OCR's Leon Rodriguez offers strategies based on initial audit findings and breach investigations.
Forensics expert Rob Lee says its not new types of attacks that concern him. It's the old ones that continue to impact organizations. How can forensics pros learn from past incidents and respond in 2013?
For the first time, a federal investigation of a health information breach that affected fewer than 500 individuals has resulted in a financial penalty for HIPAA violations. Read more about the settlement.
An evolving concept known as "intelligent security" involves using a combination of technologies to detect threats, helping security professionals become more proactive. Learn how pioneers are using the new approach.
A long-overdue omnibus package that includes HIPAA modifications tops the list of regulations dealing with health data privacy and security issues that are pending for 2013. Find out what else is on the horizon.