Privacy & Security

Credit: Emerus

By Mike Miliard 09:42 am November 21, 2017
By redesigning IT processes with help from Citrix and close input from clinicians, the health system is driving efficiency, bolstering security and boosting morale.
HHS Cybersecurity Task Force

Rep. Greg Walden, R-Oregon, from the House Committee on Energy and Commerce. Credit: Twitter

By Jessica Davis 12:29 pm November 20, 2017
Congressman says BOMs included with every device will help organizations assess threats and give transparency with managing system vulnerabilities.
Medical IoT legislation
By Bill Siwicki 09:49 am November 20, 2017
The Internet of Medical Things Resilience Partnership Act would require the FDA to establish a working group to recommend frameworks and guidelines for medical device security.
Holiday cybersecurity
By Bill Siwicki 09:37 am November 20, 2017
More employees work remotely and shop online during the holidays and, as a result, cybercriminals increase their attacks on healthcare and other organizations.
antivirus software
By Jessica Davis 04:34 pm November 16, 2017
A Ponemon Institute report predicts 35 percent of cyberattacks to be fileless in 2018, and these attacks are nearly 10 times more likely to succeed than file-based attacks.
House investigating HHS

Energy and Commerce Committee chambers. Credit: Facebook

By Jessica Davis 02:09 pm November 15, 2017
HHS is accused of retaliating against two of its cybersecurity leaders for speaking with the committee.
Blockchain in healthcare
By Bill Siwicki 12:02 pm November 15, 2017
While EHRs and information security get all the attention, there are more immediate opportunities for the distributed digital ledger technology.  
Marin General cybersecurity

Marin General Hospital in Greenbrae, California. Credit: Google Maps

By Jessica Davis 09:56 am November 13, 2017
Marin General has seen a 50 percent reduction in system vulnerabilities and 100 percent participation in staff security awareness efforts -- just by building a system designed for the humans who use it.
Trojan malware attack
By Jessica Davis 10:46 am November 10, 2017
A new Ursnif variant uses stored emails to send what appear to be legitimate messages and, once the payload is deployed, turns its victims into a delivery vehicle.
AWS cloud server

Amazon office front door. Flickr photo by Robert Scoble

By Jessica Davis 10:03 am November 09, 2017
A new warning feature will appear on multiple spots across the console, while a privacy feature includes support to encrypt all S3 data by default.

Most Read

The Daily Brief Newsletter