Joy Pritts, chief privacy officer at the Office of the National Coordinator for Health IT, offers insights on the best ways to prevent data breaches involving lost or stolen devices or records snooping.
Twitter's announcement that it's adding "forward secrecy" encryption to its sites should serve as a reminder that organizations need to continually assess the risks to their organization, experts say.
Business associates have been involved with fewer major health data breaches so far this year, compared with 2012. Are they getting better at prevention, or are they just under-reporting breaches?
Computer scientists at the Georgia Institute of Technology are developing new ways to apply encryption when storing or searching data in the cloud, says Paul Royal, associate director of the university's information security center.
An auditor's investigation into a breach at Minnesota's health insurance exchange before it opened for consumers pinpoints several mistakes. The auditor also urges other exchanges to ramp up security.
The National Institute of Standards and Technology continues to collaborate with the National Security Agency on its IT security guidance even as it investigates whether the spy agency meddled with one of its special publications.
Noting that its integrity has been questioned, NIST has launched a formal review on how it develops cryptographic standards over concerns that the NSA might have corrupted its encryption guidance.
The Department of Veterans Affairs faces ongoing breach prevention challenges, according to recent investigations. Learn what the scrutiny has revealed and what the VA is doing to bolster breach prevention.
The National Institute of Standards and Technology is re-evaluating a set of its special publications because of concerns expressed by some leading cryptographers that the National Security Agency might have corrupted the guidance.
Scientists are discovering ways to make quantum key distribution a more cost-effective and efficient way to securely share encryption keys, but there's still a long way to go before the methods can be practically applied.
Even with the latest disclosures of the efforts the National Security Agency goes through to decrypt Internet communications, enterprises can take specific steps to protect their information from prying eyes.
The NSA, in a highly classified program code-named Bullrun, used supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine encryption, according to a news report.
International markets that have implemented EMV technology are seeing reductions in card fraud, but non-EMV markets are seeing dramatic upticks, says U.K.-based card fraud expert Neira Jones.
The National Institute of Standards and Technology has issued new guidance for designing cryptographic key management systems that describes topics designers should consider when developing specifications.
The National Institute of Standards and Technology issues a revision to the digital standard used to ensure the integrity of electronic documents and the identity of the signer.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.