Privacy & Security
Revenue Cycle
Cybersecurity experts want to open the hood and and test the digital ledger technology for identity and access management.
Privacy & Security
These tools have evolved in maturity, and there are ways to conduct due diligence to get past the hype.
Privacy & Security
Cloud hosting and server management provider notified Alabama’s Surgical Dermatology Group that a hacker had access to its server from March 23 until about May 1.
Privacy & Security
Mike Restuccia says the WannaCry, Petya and ransomware attacks demand more collaboration between healthcare leaders and government agencies, immediately.
IT Infrastructure
The Trump White House is building upon Obama’s security work, according to former Cybersecurity Coordinator Michael Daniel, but cyberthreats keep getting bigger.
Privacy & Security
Ridge joins Obama’s cybersecurity czar Michael Daniel and other experts speaking at the upcoming event.
Security
Applying tactics commonly used to secure laptops and servers is not enough for Internet of Things devices and apps.
Security
Understanding the phenomenon comes first. Then there's a variety of tactics CIOs and CISOs can deploy to protect against attackers using the nefarious web.
Analytics
The conference, in Boston Sept. 11-12, 2017, will address how to become a cybersecurity superhero, surviving on a tight budget, world-class strategy, emerging technologies and more.
Pophealth
From a job killing acronym to tech trends they're sick of hearing, prominent technologists share the least-liked, most-overused idioms, slang and jargon.