Corporate Security

The Office of the National Coordinator for Health IT is studying use of mobile devices in small healthcare environments. The goal: new mobile security guidance that will be released in 2013. The Office of the National Coordinator for Health IT next spring will release a guidance...

Expert: Nation States, Crime Rings Pose Increasing Threat Banks and the U.S. payments infrastructure are prime targets for international cyberattacks. And it's not just money hackers are after, says Bill Wansley of Booz Allen Hamilton. What else is at risk? Wansley, a financial fraud and risk consultant...

The National Institute of Standards and Technology has issued a revision of its guidance to help organizations establish programs to manage computer security incidents. NIST, in Special Publication 800-61 Revision 2: Computer Security Incident Handling Guide, spells out what incident-response capabilities are necessary to rapidly detect...

Cyber Benefits from Shift to Enterprise Risk Management Flipping through the 150-page 2012 RIMS Benchmark Survey, in preparation for an interview on the study's findings (see Social Media Risks: Weigh Pros, Cons), I noticed lots of figures on payouts for auto, aviation, fiduciary, marine, malpractice, worker's...

Public-Private Partnership Focuses On Prevention The Obama administration has launched a new public-private collaborative effort to help prevent healthcare insurance fraud. The voluntary group includes healthcare organizations and associations, health insurers, federal and state agencies, and anti-fraud groups that together aim to combat healthcare fraud through the...

NIST Revising Guide on Detection, Prevention Software Intrusion detection and prevention software has become a necessary addition to the information security infrastructure of many organizations, so the National Institute of Standards and Technology is updating its guidance to help organizations to employ the appropriate programs. NIST is...

NSA Chief: Cybercrime constitutes the “greatest transfer of wealth in history”  The loss of industrial information and intellectual property through cyber espionage constitutes the "greatest transfer of wealth in history," the nation's top cyber warrior Gen. Keith Alexander said Monday. U.S. companies lose about $250 billion per...