Ramped up HIPAA enforcement is a big reason behind the No. 1 information security priority for the coming year: improving regulatory compliance, says attorney Adam Greene.
Bank of America's Keith Gordon says securing the mobile channel is much like securing any other banking channel: Controlling risks requires layers of security and controls. But educating customers plays a key security function, too.
Sen. Charles Schumer is asking the Federal Trade Commission to look into a new practice in which credit agencies keep estimates of individuals' personal information such as medication use and personal income from consumers.
Improving regulatory compliance efforts is the No. 1 information security priority for healthcare organizations in the year ahead. That's a key finding of the inaugural Healthcare Information Security Today survey.
ID theft expert Joanna Crane wonders whether banks, government agencies and healthcare providers do enough to assist consumers with ID theft recovery, saying consumer expectations are often loftier than what's being done to meet the demand.
News this week about an "ethical hack" of a Medtronic insulin pump, which has a wireless transmitter, could prove to be a catalyst for ramping up efforts to protect the security of medical devices.
Roger Baker, CIO at the Department of Veterans Affairs, outlines the department's mobile device security strategy, providing details on the rollout of iPhones and iPads.
Facial recognition, arguably, is the technology that most threatens individual privacy online, and that's on the mind of Senate Commerce Committee Chairman Jay Rockefeller, who has asked the FTC to report on its growing use.
Investigators have linked a retail-credit scheme to a pair of fraudsters who are believed to have stolen $9 million from 8,000 victims. How could such a scheme go undetected for 15 years?
The Department of Defense and two other government agencies have issued a proposed rule designed to help ensure that government contractors provide adequate privacy training to their staff members.
While a presidential advisory council wants to move forward quickly with using metadata tags within electronic health records, such as to indicate patient privacy preferences, another federal advisory panel is saying "not so fast."
The certificate authority system is flawed. It's like the Wild West, disjointed and unregulated, where no enforcement exists for standardized accountability.
Hacks are unavoidable; they happen. The challenge is how to handle them once they occur. DigiNotar demonstrates what organizations should not do when a breach is discovered.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.