A federal advisory panel has taken a small step toward establishing voluntary electronic health records software certification requirements designed to help pave the way for securely exchanging behavioral health information.
During a video interview with Information Security Media Group, FireEye's SVP and COO, Kevin Mandia, details the three stages of advanced threats; attractive nuisances, criminal activity, and nation-state activities.
During a video interview with Information Security Media Group, FireEye's David DeWalt, CEO, and Kevin Mandia, SVP and COO, discuss the new security model, and how to effectively prevent against cyber-threats.
For the next round of HIPAA compliance audits that begins this all, organizations need to prepare documentation that can speak for itself, because unlike the pilot program, there will be no onsite visits, says privacy attorney Adam Greene.
The Office of the National Coordinator for Health IT has unveiled its 10-year plan for achieving an interoperable, nationwide health IT infrastructure. The plan includes privacy and security among five core building blocks.
The Senate has confirmed Sylvia Mathews Burwell as the next secretary of the Department of Health and Human Services, replacing Kathleen Sebelius, who announced her resignation in the wake of the troubled HealthCare.gov launch.
In the wake of the Heartbleed flaw, a researcher finds new weaknesses in OpenSSL that could be exploited to launch man-in-the-middle attacks, distributed-denial-of-service attacks and remote-code execution on millions of sites.
Although breach prevention may be on the minds of more CEOs and boards of directors in the wake of recent incidents, getting their buy-in for funding still requires educating them on the risks that could have an impact on the business.
There's good news on the Zeus Gameover Trojan and Cryptolocker ransomware campaigns: The number of new infections has become "very low," if not fallen to zero. But related attacks could quickly resurge. Learn the reasons why.
A George Mason University researcher says NIST's cybersecurity framework is likely to cause more problems than it solves. Instead, he encourages critical infrastructure operators to adopt dynamic cybersecurity provisions.
Healthcare organizations using medical devices that run on the Microsoft Windows XP platform, which is no longer supported, need to have short- and long-term strategies to address cybersecurity, says medical device security researcher Kevin Fu.
An ongoing APT campaign employs decoy documents to lure potential victims into installing malicious remote-control tools. Targets include at least one bank, the BBC and many U.S. and EU government agencies.
Security researchers say the international takedown of the Gameover Zeus botnet and servers for CryptoLocker ransomware will have a positive short-term impact, but they warn the threats could quickly re-emerge unless key steps are taken.