The Health Insurance Portability and Accountability Act (HIPAA) just celebrated its 20th anniversary in 2016 as one of the most significant pieces of healthcare-related legislation in U.S. history. Once viewed as a "paper tiger," it has taken many years for the full impact of HIPAA's data security provisions to be...
Facebook says it hasn't seen ransomware spreading through its Messenger instant messaging platform despite recent reports from researchers saying that the file-encrypting Locky may have slipped through.
Cyberattacks grab headlines. The severity and frequency of attacks hitting both small and mammoth organizations alike continue to alarm the public...but cyber security professionals are the ones who really lose sleep at night. Before waiting for an attack to occur and scrambling to put a response program into action,...
The proposed guidance from the National Highway Traffic Safety Administration focuses on hardening a vehicle's electronic architecture against cyberattacks and to ensure vehicle systems take appropriate actions even if an attack succeeds.
When it comes to describing the top fraud threats to UK financial institutions, it's all about compromised identities and credentials, says John Marsden of Equifax. How can organisations prove their customers are who they say they are?
This case study delves into how El Paso Area Teachers Federal Credit Union was able to use strong authentication to simultaneously:
Secure access to all applications
Eliminate the cost and frustration of password resets
Improve employee productivity and satisfaction
In the face of evolving cyberthreats, organizations of all sizes need a more resilient cybersecurity architecture.
In an interview about achieving resilient cybersecurity, Kaczmarek discusses:
How security leaders can prioritize their defenses again the many threats they face;
The benefits of using a hybrid...
It's a story you'll watch unfold time and time again. The breach. The headlines. The confusion. The public apologies. The finger-pointing. And it's often followed by some form of the following statement: "But I was compliant." Compliance is never enough. The challenges are understandable, but taking the path of least...
The rising cost of pharmaceuticals is an unfortunate reality that can render patients unable to afford medication. This struggle was evident to Dr. Michael Rae who created the Rx Savings Solutions app that helps consumers save on prescription costs. Dr. Rae is a medical expert, but since technology is not his forte,...
The Health Information Trust Alliance (HITRUST) began a search for a secure cloud solution for their Common Security Framework (CSF) application. CSF gives businesses the structure, detail and clarity needed to more efficiently and effectively meet healthcare regulatory compliance standards, including HIPAA.
As pressure to speed the development of applications intensifies, CISOs must be the "voice of reason," taking a leadership role in ensuring security issues are addressed early in app development process, says John Dickson, principal at Denim Group, a Texas-based security consultancy.
A developer warns that Dropbox gains wide-ranging access to Apple's OS X operating system using a SQL trick that some equate to hacking users' systems. Here's why giving a desktop app unusual access to Apple's privacy settings poses a security risk.