Too often enterprises fail to adequately vet their cloud service providers, which can create security vulnerabilities, according to IT security lawyers Francoise Gilbert and Ellen Giblin.
The privacy profession is evolving rapidly, and security leaders increasingly need to understand the unique demands and responsibilities that come with protecting privacy. But where do they gain this insight?
The Target breach was the hot topic for many RSA 2014 attendees, but Gartner's Avivah Litan was already talking about the next Target - a UK retailer that may have suffered a similar hack, exposing payment card data.
The cybersecurity framework, the package of best IT security practices issued in mid-February, isn't set in stone, but will evolve in the coming weeks, months and years, says the framework's point man, Adam Sedgewick.
Troy Leach of the PCI Security Standards Council says data security standards are not failing; they just aren't being applied continuously. And conformance with the Payment Card Industry Data Security Standard is just one piece of the puzzle.
The security profession isn't quite prepared to deal with the full ramifications of the 'Internet of things,' says incoming ISACA president Robert Stroud. What other challenges await security pros?
Intel Security CPO Michelle Dennedy has just written the book on privacy. What are the key components of her manifesto, and how can her ideas reshape how security pros approach privacy?
Most organizations have yet to realize the cybersecurity benefits of big data analytics, says Russell Thomas of Zions Bank. He explains steps the pioneering bank is taking to revolutionize its big data operations.
White House Cybersecurity Coordinator Michael Daniel says the toughest international cybersecurity challenge facing the Obama administration is getting cooperation in coordinating responses to online crime.
Some security experts are concerned that narrower risk assessment requirements in a proposed Stage 3 rule for the HITECH Act EHR incentive program could confuse healthcare entities about the importance of conducting a broad HIPAA risk assessment.
Federal regulators issued a report about weaknesses found in an audit of Premera Blue Cross' systems about a month before an attack by hackers against the health insurer apparently started. Could those weaknesses have opened the door to an attack?
The massive cyber-attacks targeting health insurers Premera Blue Cross and Anthem Inc. make it clear that hackers increasingly view large healthcare organizations, especially payers, as attractive targets.
A recent incident involving disposed in a vendor's dumpster is an example of why healthcare organizations say business associates taking inadequate security steps ranks as their No. 1 perceived breach threat today.
A former Texas hospital worker has received a prison term for violating HIPAA, one of the toughest penalties yet for such a crime. Learn why some legal experts say more criminal prosecutions for HIPAA violations are likely.
On the heels of the FFIEC's new business continuity guidelines, Deputy Comptroller Beth Dugan hints that new guidance related to cybersecurity risks affecting payments and mobile transactions may be coming.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.