What's required to access the Dark Web? And how does one separate fact from fiction? These are two of the five things Dark Web users need to know, says Danny Rogers, co-founder and CEO of Terbium Labs.
Paid breach notification site LeakedSource has disappeared. Given the site's business model - selling access to stolen credentials to any potential buyer - breach notification expert Troy Hunt says the site's demise is no surprise.
Federal regulators are considering the role that blockchain technology could play in advancing the secure exchange of healthcare information, says Steve Posnack of the Office of the National Coordinator for Health IT, who explains ongoing research efforts.
Terbium CEO Danny Rogers on How to Search for Your Organization's Data, interviewed by ISMG's Vice President of Editorial, Tom Field
What's required to access the Dark Web? And how does one separate fact from fiction? These are two of the five things Dark Web users need to know, says Danny Rogers, cofounder and CEO...
To help prepare for ever-evolving cyber threats, healthcare entities need to learn from the security practices of other sectors, says Lucia Savage, former chief privacy officer at the Office of the National Coordinator for Health IT.
The Healthcare Information and Management Systems Society's 2017 Conference will offer a slew of educational sessions and informative exhibits focused on top cybersecurity and data privacy challenges facing the healthcare sector. Catch our coverage.
Information Security Media Group has a team of editors covering RSA Conference 2017. What are the hot topics from the show floor? Who are the key thought leaders on camera in ISMG's video studio? See and hear highlights from the first two days of the event.
When it comes to health data privacy and security issues, industry experts aren't sure what to expect from Tom Price, M.D., the newly confirmed secretary of the Department of Health and Human Services. But they offer a wish list of what they hope will happen.
Televisions that spy on their users have long been a trope of dystopian fiction, including George Orwell's "1984." But the spying TV appears to be far from fictional, according to a new settlement agreement reached between the FTC and smart-TV maker Vizio.
Google plans to appeal a court order to comply with search warrants asking for account information stored outside the U.S. The ruling comes as Microsoft recently prevailed in a similar case, creating legal ambiguity.
VASCO Data Security's Scott Clements on Aligning Security with User Experience
With great efficiencies and cost savings also come great threats and fraud risks. This is today's digital reality, and it is why cybersecurity and the user experience need to be aligned to create digital trust, says Scott Clements of VASCO...
Blockchain, the distributed ledger technology for cryptocurrency, has the potential to improve the privacy and security of health information exchange, says Shahram Ebadollahi, vice president of innovations at IBM Watson, which is collaborating with the FDA on a research project.
Privacy and data security experts are sizing up how an executive order signed by President Trump that requires two regulations to be eliminated for every new regulation issued by an executive branch department or agency might affect the actions of the Department of Health and Human Services.