Several Blue Shield of California spreadsheet reports inadvertently containing the Social Security numbers of 18,000 physicians and others were released 10 times by the state's Department of Managed Health Care. How could this have been prevented?
The idea of a cyber war council, reportedly proposed by a financial services industry trade group, has not received an enthusiastic reception from cybersecurity experts, some of whom question its viability to defend against cyberattacks.
Is having too many stakeholders who care about cyberspace's viability a hindrance to security? That's one way to interpret comments from White House Cybersecurity Coordinator Michael Daniel as he addresses the challenges of governing the Internet.
Characterizing the state of employment among American information security practitioners, executive recruiter Joyce Brocaglia says, "We are experiencing negative unemployment in the field of information security."
What is the consumer impact of big data breaches such as Target's and P.F. Chang's? Victims blame the breached entities, and they want government action, says Al Pascual of Javelin Strategy & Research.
From Neiman Marcus to P.F. Chang's, 2014 has shaped up to be the 'Year of the Data Breach.' What lessons can be gleaned from the trenches of breach investigation? Experian's Michael Bruemmer shares tips.
The "Energetic Bear," a.k.a. "Dragonfly," hacking campaign targets U.S. and Western European energy firms. While the hackers appear to be backed by Russia, the purpose of their attacks remains unclear.
HIPAA settlements with large financial penalties grab headlines, but the majority of regulatory actions tied to breaches and other HIPAA complaints call for no such penalties. And most complaints are dismissed. Find out why.
A Florida law that takes effect July 1 toughens the state's data breach notification statute by, in part, broadening the term "personal information" to include individuals' usernames and e-mail addresses under certain circumstances.
Using big data to fight fraud is a challenge for most organizations. Andreas Baumhof of ThreatMetrix explains how context-based authentication combines fraud and security to leverage the use of big data.