Privacy & Security
10:03 am October 05, 2015
Most people navigate the World Wide Web via well-known search engines such as Google or Bing. Underneath the publicly accessible web, however, is the "Deep Web," the part of the web that is not indexed by common search engines.
08:45 am September 21, 2015
You don't need to take a defensive stance that restricts data exchange.
11:05 am September 15, 2015
If you're concerned with data security or privacy these days -- and who isn't? -- you need to understand the fast-changing world of cyber-crime, cyber-terrorism and cyber-espionage.
06:09 am September 09, 2015
Broadly defined, software as a medical device is any app used by providers to make clinical decisions. An increasing number of those are now officially designated as FDA-regulated devices. Is it worth it to pursue this classification for your own software?
03:42 pm August 26, 2015
In many organizations today, incident response is run like a relay race, typically starting with information security and with each response function handing off to the next in sequence. With each leg, the clock is ticking, and at each handoff, vital information may be lost.
10:57 am August 18, 2015
Healthcare requires an informed balance between delivering care and protecting patient information. That is best achieved when both IT and security staff have a close working knowledge of how the caregivers are using technology to get the mission done.
09:12 am August 12, 2015
Given that healthcare organizations must sometimes exchange sensitive patient data with external parties, how can they ensure that this is done safely, protecting patient privacy and complying with HIPAA requirements?
08:17 am August 11, 2015
For years, manufacturers of medical devices depended on the "kindness of stranger," assuming that devices would never be targeted by bad actors. Hospitals must do their best to isolate medical devices from the internet and from other computing devices that could infect them.
06:41 am July 31, 2015
Back in the old days -- say, a whole 10 years ago -- thieves had to be physically inside a healthcare facility to steal patient information. How times have changed.
09:26 am July 30, 2015
The dangers of data breach make for great headlines: data held for ransom, financial fraud, medical identity theft. But despite the risks of a breach, the most immediate threat in most security incidents is failure to comply with regulatory requirements.