Apps for wearable devices that are designed to track a user's pulse rate, blood-oxygen level or location may be leaking that data during transmission, Symantec security researcher Candid Wüeest warns in a Black Hat Europe briefing.
Cedars-Sinai Health System says approximately 33,000 patients were affected by a data breach involving the theft of a laptop computer from an employee's home. Find out what information is at risk.
When the new Apple Pay mobile payment system launches in October in the United States, it could help improve payment security. This infographic reviews the system's features and how to put them to use.
Healthcare providers that decide to accept consumer-generated health or fitness data from wearable devices, such as the upcoming Apple Watch, need to develop a plan for protecting the privacy of that information, says privacy attorney Scot Ganow.
Mobile banking is growing out of its infancy and experts predict it will soon be the dominant banking and payments channel. With the vast array of endpoints being utilized, how are the threats of rogue mobile apps, mobile malware and SMiShing evolving? What are the risks inherent in mobile payments? This session...
2014 has seen an explosion of mobile banking demand and services. But as the channel grows, so do the threats against it. What are today's top threats, and how can institutions offer more secure mobile banking?
Can a smart phone increase your privacy and security while remaining both highly usable and attractive to buyers? The inaugural Blackphone is testing that question for consumers and businesses.
Point-of-sale retail breaches are the rage, but they are just one cyber-crime trend on the mind of RSA researcher Uri Fleyder. What are the malware and mobile threats that organizations should monitor?
A robust incident response plan is essential to comply with the HIPAA Omnibus rule -- and to minimize the impact of a breach, says Seattle Children's Hospital CISO Cris Ewell.
Users' fear of data loss on personal devices must be balanced with an organization's need to protect sensitive information, says ZixCorp's Nigel Johnson. He explains the evolution of mobile device management.
To efficiently address mobile security, organizations need to understand and acknowledge how the challenges evolve and become more complex, says Jeff Cobb, CISO at Capella HealthCare.
Fraud Summit - Chicago 2014 - Mobile banking is still in its infancy, but experts predict it will soon be the dominant banking and payments channel. What are today's key mobile fraud and security risks, and how are they evolving? Register for this session to learn about:
The risks inherent in mobile...
Trusted Identity is the end-goal, and mobile devices are the means to get there, says Dave Rockvam of Entrust. How are mobile devices being leveraged for security in the enterprise today?
Fraud Summit - San Francisco 2014 - Mobile banking usage and acceptance is growing by 50%. How prepared are banks and technology vendors to mitigate these risks while meeting customer needs? Register for this session to learn first-hand from James Van Dyke of Javelin Strategy & Research:
The latest mobility...
Identity is the new perimeter, and that concept stretches organizations into lots of new directions when managing access and privileges - especially in the mobile age, says John Hawley of CA Technologies.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.