Leading this week's industry news roundup, Trend Micro and Hewlett Packard collaborate to help fight advanced targeted threats and custom malware, while First Data and VeriFone partner to expedite EMV compliance.
The fiscal 2015 federal budget provides two agencies responsible for health information security and privacy activities with flat funding. Find out what plans are on hold, and why Congress wants greater scrutiny of EHR system interoperability.
As CEO of ForeScout Technologies, which focuses on continuous monitoring of networks, T. Kent Elliott says he has to anticipate the next generation of vulnerabilities. So what's the most significant emerging risk? The Internet of Things.
This past year saw the revelation of three massive security bugs that existed for lengthy periods of time before they were discovered. This infographic details those exploits and just how long they went unnoticed.
Users' fear of data loss on personal devices must be balanced with an organization's need to protect sensitive information, says ZixCorp's Nigel Johnson. He explains the evolution of mobile device management.
HealthcareInfoSecurity launches its fourth annual survey to measure progress toward ensuring the privacy and security of healthcare information as more records are digitized and shared, and as more cyberthreats emerge.
Federal regulators are sending a powerful message about the importance of applying software patches by slapping an Alaska mental health services providers with a $150,000 HIPAA sanction. Learn what's included in the corrective action plan.
The "wiper" malware attack against Sony Pictures Entertainment has numerous commonalities with previous wiper attacks in Saudi Arabia and South Korea. This infographic summarizes the attacks and highlights their similarities.
Technology will always play a critical role in security. Yet, companies cannot rely exclusively on the tools. People present a number of security-related problems that companies must address with education.
Lost and stolen mobile devices might be a leading cause of data breaches. But it's a strategic mistake for enterprises to focus too heavily on device security, says Christy Wyatt, CEO of Good Technology.
It's time to consider amending the HIPAA Privacy Rule to enable the sharing of certain research data, without patients' authorization, to help improve the quality of care, contends Douglas Fridsma, M.D., a former federal health IT leader.
Has your personal information been compromised in a data breach this year? This infographic showcases incidents that have affected various sectors, from banking to restaurants, proving that no industry is safe from a cyber-attack.