With the tardy addition of the Sutter Health breach, the U.S. tally of major healthcare information breaches now includes 385 incidents affecting more than 19 million individuals since September 2009.
Does the U.S. government's shuttering of the file-sharing website Megaupload.com show that new laws are not needed to battle intellectual property piracy? Brookings's Allan Friedman believes it does.
The Europay, MasterCard, Visa standard, commonly used in most global markets, is coming to the U.S. The sooner issuers, acquirers and merchants initiate migrations, the better, says Stephanie Ericksen, head of authentication product integration at Visa.
Does the U.S. government's shuttering of the file-sharing website Megaupload.com show that new laws are not needed to battle intellectual property piracy? Brookings's Allan Friedman believes it does.
Calling information technology experts "nerds" suggests that lawmakers don't fully grasp how to battle the information security threats the U.S. government and the nation face.
A group of Saudi Arabian hackers, identified as "Nightmare," conducted distributed denial-of-service attacks Jan. 16 against the Tel Aviv Stock Exchange and El Al, Israel's national carrier.
Wikipedia.org founder Jimmy Wales pledges to shutter the online encyclopedia from midnight Tuesday to midnight Wednesday to protest anti-piracy legislation before Congress that he contends would threaten Internet freedom if enacted.
Cybersecurity Coordinator Howard Schmidt recognizes the need to battle online piracy to protect U.S. intellectual property but contends legislation before Congress to do just that would unacceptably curtail Internet freedom and increase cybersecurity risks.
The insider poses one of the greatest and most damaging security risks any organization faces. So why do so many institutions fail when it comes to addressing this most obvious security risk?
One of the most respected CISOs in the federal government, the State Department's John Streufert, is taking his vast knowledge of IT security and continuous monitoring to Homeland Security, as director of the National Cybersecurity Division.
Steven VanRoekel says the mobile revolution will fundamentally change the way the federal government serves the public and its employees. But in outlining the Federal Mobile Strategy, the federal CIO hardly mentions security and privacy.
Given the plethora of guidance available, individual operators of the nation's critical infrastructure may be challenged in identifying the guidance that is most effective in improving their security posture, GAO's Gregory Wilshusen says.
With the spotlight on federal budget cutting, two Republican senators are pressing the acting head of the Medicare and Medicaid programs to start outlining her anti-fraud efforts aimed at eliminating waste.
Three class action lawsuits have now been filed in the wake of a breach affecting 4.9 million beneficiaries in the TRICARE military healthcare program.
As voters around the country begin the process to elect the next president of the United States, cybersecurity as a campaign issue is virtually nonexistent. That's a problem.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.