Skip to main content

Security

Security
By Benjamin Harris | 01:17 pm | August 15, 2019
A new industry survey finds that a lack of network visibility is impairing already overworked cybersecurity teams.
Security
By Nathan Eddy | 12:30 pm | August 14, 2019
BluePrint's visualization software coalesces security program data from disparate sources into a central "source of truth" founded on the company's workflow automation and rules engine.
Security
By Mike Miliard | 01:53 pm | August 13, 2019
Imprivata Identity Governance extends Microsoft’s IAM technology with role-based access controls, streamlined auditing processes and more.
Security
By Mike Miliard | 05:00 pm | August 09, 2019
The Healthcare and Public Health Sector Coordinating Council has developed a guide to building a robust cybersecurity workforce, offering four suggestions for developing skills.
Security
By Mike Miliard | 01:17 pm | August 06, 2019
The new service from the standards development group will help healthcare clients optimize risk assessments, spot and fix compliance gaps, and manage third-party assurance needs, the standards group says.
Security
By Susan Morse | 05:54 pm | August 05, 2019
Ridgecrest Regional spent $72 million on a building that withstood an earthquake, but broken water pipes forced an evacuation anyway.  
Security
By Mike Miliard | 08:00 am | August 02, 2019
BlueKeep? Dridex? A state of emergency in Louisiana? Healthcare security pros find themselves living in interesting times. But with new threats emerging each day – and old ones, like phishing, not going away – some tried and true lessons are still useful.
Security
By Jessica Davis | 05:44 pm | October 31, 2018
The new HHS-DHS Health Cybersecurity Coordination Center, HC3, replaces the Healthcare Cybersecurity Communications and Integration Center after a year of turmoil and unraveling.
Security
By Jessica Davis | 04:37 pm | October 16, 2018
Part three in our cyber insurance series highlights red flags and common mistakes to avoid when shopping for a cyber policy.
Security
By Jessica Davis | 09:00 am | October 03, 2018
Simulated attacks on a healthcare organization can help infosec leaders assess their security posture, but not all pen testers are created equal and not every provider is ready to be tested.