Fighting fraud requires a well-rounded, defense-in-depth strategy that makes good use of appropriate threat intelligence, says Chris Richter of Level 3 Communications.
Two years after the leaks that showed the U.S. National Security Agency spied on America's European allies, the U.S. and Europe still need to rebuild trust so they can collaborate on defending against cyber-attacks, says Carsten Casper of Gartner.
"Show me your dashboard." That's a request security expert Gavin Millard regularly makes to CISOs to demonstrate how today's too-complex dashboards highlight the challenge of gathering and distilling essential security metrics.
The Gartner Security and Risk Management Summit tackles digital business, a concept that blurs the physical and digital worlds, and requires organizations to reconsider how they approach IT security and risk management.
Many security pros look askance at "cybersecurity." But Symantec's Sian John says the embrace of that term shows just how much senior executives are beginning to understand the risks their organizations face.
The lead cybersecurity official for Britain's GCHQ intelligence agency dismisses charges that the U.K. conducts mass surveillance. But critics question the government's introduction of the Investigatory Powers Bill.
Some healthcare associations are seeking more clarity from federal regulators about security and privacy requirements proposed for Stage 3 of the HITECH Act "meaningful use" incentive program for electronic health records. Find out their concerns.
With federal regulators moving closer to restarting the delayed HIPAA compliance audit program, now is the time for covered entities and business associates to prepare for potential scrutiny, says healthcare attorney Brad Rostolsky.
Vendors' and software makers' over-reliance on security messages and warnings has left users habituated to them, thus rendering such alerts less effective or even worthless, warns cybersecurity expert Alan Woodward.
Corporate credentials. They're the keys to your enterprise and more than likely you've taken many steps to protect them.
However, what many CISOs and security managers are finding is that traditional approaches to preventing credentials theft - from implementing stringent identity management policies to deploying...
IT security today is an illusion. We spend more and more on security software and compliance processes, yet every week we hear about another company losing corporate emails or exposing their customers' personally identifiable information to disgruntled insiders or ever-more sophisticated hackers.
With the explosion...
An amended version of the 21st Century Cure bill has passed its first Congressional hurdle without revisions to provisions that would significantly change the HIPAA Privacy Rule. The bill also would set penalties for blocking information sharing.
What are the biggest cyberthreats facing healthcare entities today and on the horizon? What steps are healthcare organizations taking to prevent and detect breaches? And what are the top data security priorities for the year ahead?
For answers to these questions and many more, check out the Healthcare Information...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.