Leading this week's industry news roundup, IBM announces Identity Mixer, a cloud-based encryption technology designed to protect personal data online, while Proofpoint releases its Enterprise Protection Suite 8.0.
Application security, especially for medical devices, needs to be a higher priority because vulnerable apps can create patient safety issues, expose patient information and raise the risk for ID theft and fraud, says security specialist Mike Weber.
As the number of major health data breaches continues to climb, federal regulators are taking steps to make the process of reporting breaches using online tools more efficient, hoping that will help ease the launching of investigations.
The increase in sophisticated hacking attacks will lead other sectors to follow the lead of the financial services industry in implementing multifactor authentication, says Ken Hunt, CEO of VASCO Data Security International.
Leading this week's industry news roundup, FireEye joins forces with ForgeRock to provide enhanced security incident detection, while Sophos launches new end-user protection products.
In the aftermath of a payment card breach, as fraudsters race to exploit the stolen information, card issuers and affected customers take steps to mitigate risks. Here's a look at the lifecycle of a payment card breach from three perspectives.
Some experts are concerned that the Department of Health and Human Services' Office for Civil Rights isn't taking bold enough action in stepping up its efforts to enforce HIPAA. Learn more about their areas of concern.
The inappropriate use and disclosure of patient information for marketing purposes by an insurer in Tennessee offers a reminder of the importance of complying with HIPAA's marketing-related provisions.
The HHS Office for Civil Rights still has plenty of work to do before it can launch its long-promised next round of HIPAA compliance audits, says Director Jocelyn Samuels.
The U.S. migration from magnetic-stripe payment cards to EMV-compliant cards is in full swing, thanks in part to massive breaches at retailers. This infographic offers a timeline of progress in implementing this new technology.
Healthcare organizations looking for help building an integrated approach to privacy and security compliance will soon have a new tool available. Find out the details about an updated framework from HITRUST.
The rapid rise in cyber-attacks on healthcare organizations necessitates the use of a cyber-centric risk management framework. Recent incidents, including the hacking attack on Community Health Systems, show healthcare is an easy target.
Nobody wants to be a cyber-attacker's first victim. But there are benefits to being second or third, says Akamai's Mike Smith. Then you get to enjoy the true benefits of the oft-discussed information sharing.
Leading this week's industry news roundup, BAE Systems launches a corporate security analysis service to assist companies with social risk monitoring, while Arbor Networks appoints its first chief technology and security officer.
Ninety percent of even the largest global firms are susceptible to targeted attacks. And if adversaries want to get in, they can, says Peter George, CEO of Fidelis Security Systems, who discusses new security strategies.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.