Following its mega-breach, the U.S. Office of Personnel Management suspends use of its online background check application system, citing a vulnerability. Also, the agency now faces a breach-related lawsuit filed on behalf of federal workers.
The Department of Justice has announced the indictments of two individuals in separate fraud cases affecting the University of Pittsburgh Medical Center. The cases spotlight the challenges healthcare organizations face in the fight against fraud.
Just how bad is the U.S. Office of Personnel Management breach? Consider that spies may now have access to every secret - sexual, financial, familial, medical - shared by personnel seeking security clearances to access classified U.S. information.
President Obama proposes spending more money on cybersecurity, replacing government agencies' antiquated, unsecured systems. But what really needs to be done to thwart breaches, like the hack attack against the Office of Personnel Management?
As hackers increasingly focus their attacks on the government and healthcare sectors, it's more critical to ensure that consumers' personal data is handled securely on Obamacare's HealthCare.gov website as well as state health insurance exchanges.
China is the "leading suspect" behind the OPM breach, says Director of National Intelligence James Clapper, who adds that until the U.S. can meaningfully deter such attacks, it must focus on getting better at defense, not retribution.
The 'Cybersecurity Domino Effect' is a new term to describe the cumulative impact of multiple data breaches. How should organizations and individuals respond? Michael Bruemmer of Experian offers guidance.
In this audio report on a Senate hearing, the federal CIO justifies his backing of Office of Personnel Management Director Katherine Archuleta as she defends retaining a contractor whose stolen credentials may have led to the breach.
An error in a coding upgrade for a Blue Shield of California website resulted in a breach affecting 843 individuals. The incident is a reminder to all organizations about the importance of sound systems development life cycle practices.
As threats evolve, healthcare organizations are embracing new solutions to protect health data. But data protection is not enough, says Microsoft's Leslie Sistla. Detection and response strategies are required.
China and the U.S. have agreed to create a new cyber "code of conduct." The move comes in the wake of the U.S. Office of Personnel Management breach, with President Obama urging Chinese officials to help lower cyber-related tensions.