Healthcare data breaches, such as the recent hacking incident at Community Health Systems, point to the need to improve data governance programs, say two security experts, who offer breach prevention insights.
Healthcare organizations are still struggling to make sense of all the emerging cyberthreats they face and figure out how best to share the latest intelligence and stretch limited security resources. But some are making bold moves.
Leading this week's industry news roundup, Juniper Networks announces advancements in its threat intelligence platform, while Fiserv releases tokenization capabilities for its mobile wallet application.
Amidst a year of high-profile and costly data breaches, what can organizations be doing to help ensure they aren't the next victims? Charley Chell of CA Technologies discusses new authentication solutions.
Once the now-delayed HIPAA compliance audits resume, federal regulators will be conducting more on-site audits and fewer remote desk audits of covered entities and business associates than originally planned.
New point-of-sale malware known as Backoff has been linked to numerous remote-access attacks, putting smaller merchants at greatest risk. This infographic describes what you need to know about this growing threat.
2014 has seen an explosion of mobile banking demand and services. But as the channel grows, so do the threats against it. What are today's top threats, and how can institutions offer more secure mobile banking?
Compliance attorney Betsy Hodge discusses the last remaining HIPAA Omnibus deadline that's quickly approaching for covered entities and business associates, and the impact of the final rule nearly one year after its enforcement began.
News that Community Health Systems suffered a massive data breach illustrated yet again the U.S. healthcare sector's vulnerability. This infographic takes a look at the top five health data breaches in recent years.
Financial institutions feel the pain of recent retail breaches, and they seek new ways to secure payments and fight fraud. But how can security leaders influence changes within their own organizations?