If healthcare providers rely on the Direct protocol to meet HITECH Act Stage 2 data exchange requirements, how will that affect the fate of health information exchange organizations? Find out what some HIE experts think.
Security specialist David Newell outlines common pitfalls healthcare organizations need to avoid when conducting a risk analysis - such as focusing on an insufficient, narrow HIPAA compliance assessment.
A key difference between state-sponsored espionage and organized criminals or hacktivists is the level of persistence and determination to break through defenses. Here's advice from security experts on defending against nation-state attacks.
The biggest lesson banking institutions can learn from this week's reported $45 million global cyberheist: Old attacks always return. Learn why thwarting these coordinated fraud schemes is challenging.
Payment data and personal information are both attractive targets for criminals, says breach investigator Erin Nealy Cox of forensics firm Stroz Friedberg. Learn why she says card data isn't the only lucrative target.
A recent spear-phishing attack involving a Trojan designed to target Android devices offers an important reminder of the emerging threat of mobile malware, says Kaspersky Lab researcher Kurt Baumgartner.
A Defense Department report to Congress says China could use the targeted information to benefit its defense and high-technology industries as well as give Chinese policymakers a clear picture of U.S. leadership thinking on key China issues.
If the hacking community judges the planned OpUSA cyber-attack a success, it could spur more nefarious actors to try more vicious disruptions of U.S. websites, a Department of Homeland Security alert says.
The Department of Health and Human Services has released voluntary guidelines for health information exchange that include "trust principles" for security and privacy. Find out about the consumer rights outlined.
Intel Chief Information Security and Privacy Officer Malcolm Harkins sees having one leader who handles IT security and privacy responsibilities as essential. "At the end of the day," he says, "there's a level of common objectives."