The leader of the Centers for Medicare and Medicaid Service pledges to carry out 28 recommendations made by a watch-dog agency to improve the security of HealthCare.gov before the next open enrollment period for Obamacare begins Nov. 15.
Leading this week's industry news roundup, Juniper Networks announces advancements in its threat intelligence platform, while Fiserv releases tokenization capabilities for its mobile wallet application.
Amidst a year of high-profile and costly data breaches, what can organizations be doing to help ensure they aren't the next victims? Charley Chell of CA Technologies discusses new authentication solutions.
Once the now-delayed HIPAA compliance audits resume, federal regulators will be conducting more on-site audits and fewer remote desk audits of covered entities and business associates than originally planned.
New point-of-sale malware known as Backoff has been linked to numerous remote-access attacks, putting smaller merchants at greatest risk. This infographic describes what you need to know about this growing threat.
2014 has seen an explosion of mobile banking demand and services. But as the channel grows, so do the threats against it. What are today's top threats, and how can institutions offer more secure mobile banking?
News that Community Health Systems suffered a massive data breach illustrated yet again the U.S. healthcare sector's vulnerability. This infographic takes a look at the top five health data breaches in recent years.
Financial institutions feel the pain of recent retail breaches, and they seek new ways to secure payments and fight fraud. But how can security leaders influence changes within their own organizations?
Leading this week's industry news roundup, FreedomPay unveils a point-to-point-encryption payment technology solution as part of its cloud-based platform, and Rain Networks and Data Motion launch a partnership.
Following Target's data breach in December 2013, the fallout for the company continues to grow. This latest infographic from DataBreachToday shows the impact of the incident in terms of breach expenses and other factors.