The University of Texas MD Anderson Cancer Center has reported its second data breach in recent weeks involving an unencrypted mobile device. Find out the details.
A new House bill that would let VA doctors treat veterans across state lines via telemedicine opens up questions about how state privacy laws might apply to physicians in the event of a breach.
The United Kingdom and the United States are both cracking down on healthcare organizations that have experienced information breaches. But they're taking very different approaches. Which approach will prove most effective?
The Office of Management and Budget is now reviewing both rules for Stage 2 of the HITECH Act electronic health record incentive program - the final step before publication.
LinkedIn's failure to comply with long standing industry standard encryption protocols jeopardized its users' PII, and diminished the value of the services, the class action federal lawsuit filed in northern California says.
Gartner's Peter Firstbrook, to illustrate the vulnerability of IT systems, cites research that pegs at about 400 days the average time a targeted virus remains undetected on a computer. And, he says, that doesn't speak highly of the current offerings from security vendors.
Four recent breach incidents, including one affecting LinkedIn, have put the spotlight on the effectiveness of hashing. Why is hashing increasingly ineffective at protecting online passwords?
Israel's intelligence agency supervises commercial banks' IT systems because they're considered part of the critical national infrastructure, and that's okay with the bankers. See why.
Israel is being blamed - or, perhaps, taking credit - for the creation of Flame, the sophisticated cyberspyware that has targeted organizations in the Middle East, especially its mortal enemy, the government of Iran.
Federal authorities are seeking comments on plans for voluntary national standards, including privacy and security guidelines, for health information exchanges. Their announcement poses 66 questions.
Payments processor First Data warns about an uptick in trolling - hackers sniffing networks for easy access to merchants' point-of-sale systems. What can banks do to help merchants prevent breaches?
What do the proposed Stage 2 rules for the HITECH Act electronic health record incentive program have to say about encryption and other security measures? Consumer advocate Deven McGraw provides an analysis.
Even while working to re-establish its own PCI compliance, breached payments processor Global Payments Inc. is helping merchants assess and improve their payment card security.
Gartner fraud expert Avivah Litan shares ideas about how lessons learned from the Global Payments data breach can help security practitioners mitigate card-fraud risks and prevent future incidents.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.