As a result of Experian's data breach, 15 million T-Mobile subscribers are at risk from phishing attacks and fraud. But it's not clear what more T-Mobile can do to protect breach victims, says security specialist Mark James.
President Obama, in reaching any type of cybersecurity accord with Chinese President Xi Jinping, should borrow from the diplomacy he used to reach the Iranian nuclear agreement: Get the best deal possible and then distrust but verify.
Adjusting risk management strategies in the aftermath of the newly discovered hacker attack on Excellus BlueCross BlueShield, as well as other recent massive cyber-attacks, will be among the hot topics discussed at the Healthcare Information Security Summit in San Francisco on Sept. 17.
It's "cyber party" time, as self-described "eccentric millionaire" - and onetime anti-virus company founder - John McAfee announces that he's entering the 2016 U.S. presidential race with a newly created party that will focus on security and privacy.
In the wake of hacker attacks, which have left healthcare providers uncertain about what security steps to take, the Office of the National Coordinator for Health IT is working to help organizations sort out role-based identity and access management issues, says ONC's privacy officer, Lucia Savage.
A migration of fraud to the card-not-present environment is expected in the wake of EMV. But Fiserv's Manuel Da Silva says banks also have to be worried about fraud upticks in other areas, which are already emerging. He explains how analytics can help institutions mitigate risks.
Carilion Clinic, a Roanoke, Va.-based network of hospitals and outpatient facilities, has fired or disciplined 14 employees over a problem common at many healthcare organizations: patient record snooping. Experts discuss how to tackle the challenge.
Did Massachusetts' first registered medical marijuana dispensary break federal or state privacy regulations by accidentally sharing patients' email addresses? Experts explain that ... well, the answer is a little hazy.
As the Department of Defense embarks on a multi-billion dollar project to overhaul its EHR system, supporting millions of military personnel, there are critical privacy and security challenges to be tackled.
Thou shalt not reverse engineer Oracle's products. That was the stunning diktat issued by Oracle CSO Mary Ann Davidson in a blog post that some are reading as a declaration of war against the security research community.
Akamai's John Ellis talks about the quick evolution of bots and botnets, and how enterprise security leaders should deal with them now using a three-pronged approach - detection, management and mitigation.
Just two weeks after an international, FBI-led operation disrupted the notorious hacking forum Darkode, leading to 70 arrests, a supposed site administrator has claimed the forum will reboot on the "dark Web." But security experts question those claims.
With so much stolen PII available to fraudsters, it's time for banks and others to move to more sophisticated forms of authentication of customers' identities. Knowledge-based authentication is no longer reliable.