Privacy & Security

Warriors
By David Finn 08:00 am October 28, 2015
(SPONSORED) Healthcare is under siege, and Advanced Persistent Threats (APTs) pose a particular problem. Find out how to meet wily APTs head-on with a careful, best-practice approach combined with a layered security strategy.
Padlocks and computer code
By Rick Kam 08:28 am October 19, 2015
The days of James Bond and his world-saving exploits are over. In today's reality, nation-states and their criminal partners can disrupt commerce and defenses in the free world from the safety and comfort of their computer desks.
By Axel Wirth 10:57 am October 12, 2015
(SPONSORED) If the prospect of hackers honing in on medical devices makes you uneasy, it should. Medical devices are being exploited as entry points for deeper attacks on systems within a healthcare organization.
By Rick Kam 10:03 am October 05, 2015
Most people navigate the World Wide Web via well-known search engines such as Google or Bing. Underneath the publicly accessible web, however, is the "Deep Web," the part of the web that is not indexed by common search engines.
By Keith Tyson 08:45 am September 21, 2015
You don't need to take a defensive stance that restricts data exchange.
By Rick Kam 11:05 am September 15, 2015
If you're concerned with data security or privacy these days -- and who isn't? -- you need to understand the fast-changing world of cyber-crime, cyber-terrorism and cyber-espionage.
By Chris Bowen 06:09 am September 09, 2015
Broadly defined, software as a medical device is any app used by providers to make clinical decisions. An increasing number of those are now officially designated as FDA-regulated devices. Is it worth it to pursue this classification for your own software?
By Rick Kam 03:42 pm August 26, 2015
In many organizations today, incident response is run like a relay race, typically starting with information security and with each response function handing off to the next in sequence. With each leg, the clock is ticking, and at each handoff, vital information may be lost.
By Mac McMillan 10:57 am August 18, 2015
Healthcare requires an informed balance between delivering care and protecting patient information. That is best achieved when both IT and security staff have a close working knowledge of how the caregivers are using technology to get the mission done.
By Deborah Galea 09:12 am August 12, 2015
Given that healthcare organizations must sometimes exchange sensitive patient data with external parties, how can they ensure that this is done safely, protecting patient privacy and complying with HIPAA requirements?

Most Read

The Daily Brief Newsletter