The loss of a server at a Visionworks optical wear retail store in Maryland offers a reminder not only of the importance of encryption but also the value of good inventory management and data disposal practices.
To protect against medical ID theft and fraud, healthcare organizations need to build comprehensive security programs that go beyond just putting their "finger in the dike," says security expert Mark Ford of Deloitte.
Security researchers recently uncovered a new version of the Backoff POS malware, which offers several new features that make it tougher to eradicate. This infographic offers a roundup of a number of significant recent malware developments.
A former South Carolina state employee who pleaded guilty to five felony charges after he sent personal information about more than 228,000 Medicaid recipients to his personal e-mail account won't go to prison. Find out the details.
Legal experts are analyzing the potential national impact of a Connecticut Supreme Court ruling that plaintiffs can sue for negligence if a healthcare provider violates HIPAA regulations for protecting patient privacy.
JPMorgan Chase in September confirmed that it was the victim of a cyber-attack that compromised customer information. This infographic provides an overview of what we know so far and what questions remain unanswered.
A settlement finalized this past week in a class action lawsuit filed in 1997 against Tenet Healthcare for a privacy breach involving thousands of patients' paper records offers important lessons for healthcare providers today.
Sophisticated threats require advanced threat protection. A threat-focused next-generation firewall must adhere to three strategic imperatives. Learn how these imperatives improve defense against advanced threats.
Leading this week's industry news roundup, Intel introduces a solution that provides end-to-end encryption of consumer and financial data built into POS systems, while Arbor Networks launches Peakflow, a DDoS mitigation solution.
Researchers demonstrate how ATMs could be hacked - without installing malware - by connecting a tiny computer to an inside port, bypassing the ATM's own computer and instructing the cash dispenser to begin issuing money.
Government intelligence agencies' information security offensive capabilities may far outstrip businesses' collective defenses, but organizations can still tap a variety of techniques to defend themselves against many types of intrusions.
Apps for wearable devices that are designed to track a user's pulse rate, blood-oxygen level or location may be leaking that data during transmission, Symantec security researcher Candid WÃ¼eest warns in a Black Hat Europe briefing.