Healthcare providers who fail HIPAA audits, put patients and their data at risk often share a common oversight: They've failed to identify every place where electronic protected health information (ePHI) is stored in their organization.
One widespread blind spot are medical devices, from pulse oximeters to CT...
NIST awards a total of $7 million in grants to five organizations to develop and pilot reliable and easy-to-use identity credentials that could help build trust in online commerce and boost the economy.
A soon-to-be-completed regulatory framework to address patient safety issues posed by medical devices, electronic health records and other health IT must consider cybersecurity issues, says Julian Goldman, M.D., a federal adviser.
On the one-year anniversary of al-Qassam Cyber Fighters' first announcement about DDoS attacks against U.S. banks, experts discuss what may happen next, including whether the group will join forces with the Syrian Electronic Army.
According to Gartner, 38% of companies will stop issuing laptops to employees by 2016. Clearly, BYO for laptops - and tablets and smartphones too - is a trend that is picking up steam. However, the apprehension about the best way to implement BYO is also growing with concerns around corporate compliance and...
The National Institute of Standards and Technology is re-evaluating a set of its special publications because of concerns expressed by some leading cryptographers that the National Security Agency might have corrupted the guidance.
Apple's inclusion of a fingerprint scanner in its iPhone 5S is an important step toward bringing biometrics into the mainstream. But there's a long way to go before biometrics supplant passwords at the enterprise level.
The Department of Health and Human Services is considering consolidating information security activities in light of a watchdog review that found potential duplication among multi-million-dollar investments.
This document provides you with an understanding of common cybersecurity tests and assessments organizations can use to evaluate their security posture and the distinctions between them. It will help you more accurately determine which assessment may be appropriate for your organization's needs.
Use this white...
No matter the size of your organization, advanced cyber-attacks represent a credible threat to your organization.
Security analyst firm Securosis and Dell SecureWorks collaborated on this guide to help:
Mine for threat indicators;
Respond to alerts;
Break the attack process.
New federal guidance promotes the use of key privacy and security capabilities in electronic health record systems used by healthcare providers ineligible to participate in the HITECH Act incentive program.
Account takeover is becoming more prevalent and difficult to combat as data breaches increase and phishing scams continue to evolve. In this white paper, NuData Security examines the recent trends relating to account takeover and makes recommendations in protecting against this financially destructive fraud.
Special Publication 800-101 Revision 1 is aimed to help organizations develop procedures to deal with the explosion of mobile devices and to prepare specialists to conduct forensically sound examinations.
Scientists are discovering ways to make quantum key distribution a more cost-effective and efficient way to securely share encryption keys, but there's still a long way to go before the methods can be practically applied.