Privacy & Security
The final tally has nearly doubled since United Health Group's estimates this past December. With breach notifications now mailed, the incident call center will be closing Aug. 26, says UHG.
The California class action suit alleged that the Facebook parent company had collected data from the Flo Health period tracking app and used it without consent for targeted advertising.
Innovaccer, Palo Alto Networks, Samsung and others are using artificial intelligence to improve patient access, enhance urgent care and home health with clinical insights, position mobile health data for consumption, and secure agentic AI integrations.
HIMSS25 APAC
There are still risks that hospitals must keep in mind when setting up AI-powered defence systems, according to a private hospital chain's CIO.
Sweden's digital literacy is an asset in transitioning to the European Health Data Space, but the Swedish eHealth Agency's Gunilla Nordlöf believes success depends on building public trust and communicating the value of sharing data.
The Trump administration initiative brings together Big Tech, health IT vendors, and provider and payer systems in an API-powered effort to give patients greater control over their health data. Some have questions about privacy.
IRCCS IRST Dino Amadori's Nicola Gentili says TRUMPET, FLUTE and ONCOVALUE, projects leveraging federated learning and analysis, will lay the foundation for interoperability and privacy-protecting use of data across Europe.
AI & ML Intelligence
The new plan directs the U.S. Department of Commerce to revise artificial intelligence risk management frameworks, which could undo protections that might be seen as "woke" in order to do business with the federal government.
Ven Auvaa, ArmorPoint's information security director, stresses the importance of giving employees a "clear and open pipeline to communicate" about potential social engineering exploits and phishing scams to help increase network protection.
By tricking individual users into downloading a remote access trojan through a fake browser or masquerading security software updates, threat actors then use legitimate tools to steal data before locking systems down for ransom.