Recognizing the behavior of an intruder, rather than relying on digital signatures, will prove to be a better way to prevent hackers from pilfering data and creating havoc in IT systems, says Radware CEO Roy Zisapel.
Breaches can happen even when there are strong protections in place. But healthcare organizations can do more to prepare for breaches and respond in the best possible way to protect patient information.
Federal regulators have unveiled a draft roadmap for achieving nationwide secure health data exchange built on interoperable electronic health records systems within the next three years. Learn about the privacy and security components.
Leading this week's industry news roundup, IBM announces Identity Mixer, a cloud-based encryption technology designed to protect personal data online, while Proofpoint releases its Enterprise Protection Suite 8.0.
Application security, especially for medical devices, needs to be a higher priority because vulnerable apps can create patient safety issues, expose patient information and raise the risk for ID theft and fraud, says security specialist Mike Weber.
As the number of major health data breaches continues to climb, federal regulators are taking steps to make the process of reporting breaches using online tools more efficient, hoping that will help ease the launching of investigations.
The increase in sophisticated hacking attacks will lead other sectors to follow the lead of the financial services industry in implementing multifactor authentication, says Ken Hunt, CEO of VASCO Data Security International.
In the aftermath of a payment card breach, as fraudsters race to exploit the stolen information, card issuers and affected customers take steps to mitigate risks. Here's a look at the lifecycle of a payment card breach from three perspectives.
Some experts are concerned that the Department of Health and Human Services' Office for Civil Rights isn't taking bold enough action in stepping up its efforts to enforce HIPAA. Learn more about their areas of concern.
The inappropriate use and disclosure of patient information for marketing purposes by an insurer in Tennessee offers a reminder of the importance of complying with HIPAA's marketing-related provisions.
The U.S. migration from magnetic-stripe payment cards to EMV-compliant cards is in full swing, thanks in part to massive breaches at retailers. This infographic offers a timeline of progress in implementing this new technology.
Healthcare organizations looking for help building an integrated approach to privacy and security compliance will soon have a new tool available. Find out the details about an updated framework from HITRUST.
Nobody wants to be a cyber-attacker's first victim. But there are benefits to being second or third, says Akamai's Mike Smith. Then you get to enjoy the true benefits of the oft-discussed information sharing.