The list of 36 recent major breaches of healthcare information posted on a government Web site likely represents a small fraction of the significant breaches in healthcare in recent months, security experts say.
At a Senate hearing, Michael McConnell, the former director of national intelligence, added his voice to the growing chorus of cybersecurity experts who see dire consequences of a virtual attack on America's critical IT systems.
Application security is rapidly becoming the next hot focus area for information security professionals.
Momentum began to build in 2008, when Information Security Media Group's (ISMG) Application Security Survey showed that 90% of respondents saw application security as somewhat or a significant part of their...
The Information Security Today Career Trends Survey identifies three distinct education trends re: information assurance:
Information security professionals seek advanced degrees;
Organizations are footing at least part of the bill for training;
Online education is an increasingly common and effective...
The issue of how existing online banking networks could be used to ease the exchange of healthcare information will be addressed at a "medical banking" conference in Atlanta Feb. 28-March 2.
The Medical Banking Institute is sponsored by the HIMSS Medical Banking Project. The Healthcare Information and Management...
Increasingly, digital forensics is an important element of an information security program for organizations of all types and sizes.
But where can security leaders find qualified forensics professionals? How can these professionals obtain the skills and expertise they need to be successful?
Rob Lee of Mandiant...
"Systems compromised by this botnet provide the attackers not only user credentials and confidential information, but remote access inside the compromised networks," says Amit Yoran, CEO of NetWitness, which revealed the Kneber attacks.
The federal government is seeking a contractor to help assess healthcare cybersecurity risks in the public and private sectors.
The contractor also will create and test risk mitigation strategies. The results of the project will help support development of federal policies.