Security
Security
The tool, developed by scientists at UT Dallas and Vanderbilt, can help weigh the risks that a person might be identified when their health data is shared with researchers.
Security
Experts say a functioning system should be based on understanding your workforce, your technology and your employee workload – and it should involve everyone in your organization.
Security
The Exposure Notification Privacy Act requires public health officials to be involved with any exposure notification systems and prohibits commercial use of users' data.
Security
Big transitions can present an opportunity to enact security improvements, but they can also make a complicated process even more complex.
Security
The telemedicine vendor doesn't store patient data, explained founder Brandon Welch, and relies on peer-to-peer video-calling software working inside browsers to minimize potential vulnerabilities.
Security
It's not just for clinicians anymore: Security operations center analysts say they're inundated with more and more alerts, and spend too much time sorting through false positives.
Security
Healthcare information is being more widely shared than ever, but how can that be balanced with the need for robust privacy protections? At Health 2.0, two experts will frame the issue.
Security
The companies are combining Imprivata's Mobile Device Access technology with the Vocera Collaboration Suite, which can offer faster and more authentication across workstations, virtual desktops and mobile devices.
Security
The complexities of securing a hybrid cloud environment are not to be underestimated as more health systems contend with vendor implementations of all shapes and sizes. One prominent CISO offers tips and best practices.
Security
Medical devices must be managed from a security perspective, but also from an operational perspective. Using analytics to establish behavior baselines helps support risk assessments, find malfunctions and enhance staff productivity.