HHS Proposal Would Strengthen HIPAA Privacy Rule

A new proposed rule by The U.S. Department of Health and Human Services (HHS) would give people the right to learn who may have accessed their electronically stored healthcare information.

Study Highlights Growing Mobile Risks

As workers increasingly use mobile devices in the workplace, organizations are facing increasing data loss and other risks, according to a new study from Carnegie Mellon University and McAfee.

Airlines Reduce Online Ticketing Fraud

Airlines are making progress in reducing losses from online ticketing fraud, according to a report from Cybersource, a payment processing and security subsidiary of Visa.

Senator Introduces Update to Key Electronic Privacy Law

Senator Patrick Leahy introduced legislation Tuesday that seeks to update the Electronic Communications Privacy Act.

Facebook Adds New Security Measures

Facebook announced several security enhancements last week including a new two-factor authentication system and a partnership with a service that can help users avoid clicking on risky or malicious links.

Americans Report Sharp Rise in Internet Security Concerns

Americans’ concern over Internet security has increased significantly in recent months, according to a biannual survey conducted by Unisys.

New NSA Report Details Home Computer Security Best Practices

Home computer networks can be particularly vulnerable to attack, according to a new National Security Agency (NSA) report, since security practices can be less rigorous.

Security Is a Low Priority for Cloud Service Vendors, Study Finds

Security is a relatively low priority for many cloud service providers, according to a new study conducted by the Ponemon Institute.

Survey Responders Say They Don't Have an Accurate Picture of IT Risk

A new survey says there is still widespread misunderstanding of the impact user access reviews have on enterprise IT risk.

White House Releases Plan to Protect Identities and Grow Businesses Online

The Obama administration today unveiled its strategy to safeguard transactions in cyberspace by helping to create voluntary "secure, efficient, easy-to-use, and interoperable identity solutions."

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.