The United Kingdom and the United States are both cracking down on healthcare organizations that have experienced information breaches. But they're taking very different approaches. Which approach will prove most effective?
Two men have been sentenced for defrauding accountholders whose debit cards were compromised in the Michaels point-of-sale breach that hit stores in 20 states. What was their role in an elaborate fraud scheme affecting nearly 100,000 accounts?
After a breach, some organizations meet the minimum requirements for notification and then hope for the best. The Utah Department of Health is taking a very different approach that's worthy of imitation.
Today's malware threats are designed to quietly and slowly spread to other hosts, gathering information over extended periods of time that leads to exfiltration of sensitive data and creates havoc. Here's what NIST says organizations should do.
Debate surrounding the Cybersecurity Act has focused on whether the government should regulate privately owned, critical IT systems. But the bill also would make significant changes on how government governs IT security, co-sponsor Sen. Tom Carper says. See how.