Leading the latest edition of the ISMG Security Report: England's Court of Appeal rejects U.S. extradition request for suspected hacker Laurie Love. Also, what took Uber and Partners Health so long to come clean about their respective data breaches?
As the healthcare sector implements a variety of new applications and increasingly moves to the cloud, it has a fresh opportunity to address security, says Daniel Bowden, CISO at Sentara Healthcare, who discusses best practices.
Ira "Gus" Hunt, a security expert who was formerly CTO at the CIA, analyzes why many large healthcare provider organizations plan to boost cybersecurity spending in 2018 and discusses the role of emerging technologies.
Every new cybersecurity regulation includes at least some emphasis on improving vendor risk management. But what happens when vendors balk at the extra degree of scrutiny required? Moffitt Cancer Center's Dave Summitt describes his risk-based approach to business associates.
HealthcareInfoSecurity Executive Editor Marianne Kolbasuk McGee reflects on the just-concluded Healthcare Security Summit in New York in the latest edition of the ISMG Security Report. Also, PCI Security Standards Council CTO Troy Leach addresses ransomware risks.
How do you balance privacy with data exchange among clinicians, access for patients and medical breakthroughs for researchers? This session examines whether there's a "right balance" for protecting patients' confidentiality, bolstering cybersecurity and providing individuals with access to their own health data, while...
Data protection legislation and regulatory enforcement actions are rapidly changing throughout the world, having an immediate impact on how organizations globally approach cybersecurity, privacy, breach notification and data storage and protection. Too frequently, however, U.S. healthcare organizations have built...
As information security threats intensify, organizations' risk management tasks are becoming disoriented - focused more on grappling with complex technology, an explosion of data, increased regulation and a debilitating skills shortage. This is a huge danger, because prompt action is required to interpret an...
Leading the latest edition of the ISMG Security Report: An interview with the head of a new cyber initiative to help political campaigns and local, state and federal election officials safeguard America's electoral process. Also, analyzing the evolving characteristics of the healthcare breach.
What are some of the critical action plan for firms post-breach? Sapan Talwar, former IT security leader at Adobe, elaborates on how organizations should collaborate with law enforcement agencies and regulators in the wake of a breach.
Writing the obituary for the lifeless Neutrino exploit kit leads the latest edition of the ISMG Security Report. Also, judging the value of the Department of Health and Human Services' wall-of-shame website of healthcare sector breaches.