So, what can we expect next year? Privacy expert Rebecca Herold offers her predictions for the 11 most significant healthcare information security and privacy events that will occur throughout 2018.
Fraudsters recently ordered a total of nine iPhones and Samsung S8s from Sprint and Verizon with my personal details. With the internet awash in stolen personally identifiable information, are mobile operators doing enough to prevent fraudulent orders?
It's been seven years since Dale Nordenberg, a pediatrician, became involved in the drive to improve medical device security. What progress does he see among manufacturers, government agencies and healthcare providers?
When it comes to privacy, India faces many challenges, including the need to reduce the amount of time it takes to resolve privacy-related cases, says Vicky Shah, advocate, cyber law and data protection.
SSH keys provide the highest level of access rights and privileges for servers, applications and virtual instances. Cyber criminals want this trusted status and invest considerable resources into acquiring and using SSH keys in their attacks.
Even though SSH keys are the credentials that provide the most privileged...
A 10-member government-appointed committee in India has drafted a white paper that includes recommendations for components of a new data protection law. The government is seeking feedback on the report through Dec. 31.
Traditional identity and access management (IAM) controls, though extensive, are static. Once a malicious user gains access, they are free to exploit the system up to the extent of the account's set privileges.
Download this whitepaper and learn how an identity-centric approach to security solves this problem...
RBI's recent move to mandate that all banks must use Aadhaar as the primary form of authentication for anyone accessing their bank account is stirring a debate about the long-term role of the authentication mechanism and associated data security issues.
As the GDPR's enforcement date nears, North American healthcare organizations are scrambling to ensure their data protection policies and practices are up to snuff. Mitch Parker of Indiana University Health System offers his prescription for GDPR compliance.
With the aim of protecting data privacy, the government of Singapore is considering taking steps to greatly reduce the use of the National Registration Identity Card numbers for verifying consumers' identities.
A report on the head of Equifax contending that his company - not individual consumers - owns the personally identifiable information the credit reporting agency markets to lenders leads the latest version of the ISMG Security Report. Also, a preview of the ISMG Healthcare Security Summit.
Moderator:
Geetha Nandikotkur, ISMG
How does the EU's General Data Protection Regulation impact Indian organizations? What are some challenges related to compliance with GDPR, and what is expected of organizations in the case of a data breach? How will GDPR influence business imperatives, given the hefty fines...
The latest ISMG Security Report features highlights from the recent panel discussion at the ISMG Fraud and Breach Prevention Summit in London on preparation for the European Union's General Data Protection Regulation set to be enforced next May.
Security probes into IoT vulnerabilities too often swerve into creepy territory. Take security researchers at Check Point who discovered they could seize control of an internet-connected LG vacuum cleaner's camera, allowing them to turn a roving robotic cleaner into a spy cam.
Medical device cybersecurity scrutiny usually focuses on potential patient safety issues. But vulnerabilities identified in a cardiac pacemaker programming device illustrate the risks also posed to patient data privacy, says Billy Rios, a researcher who discovered the problem.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.