Skip to main content

Network Infrastructure

By Benjamin Harris | 12:27 pm | November 21, 2019
Developing tools to separate and automatically control Internet of Things traffic is one important way to safeguard medical device security.
By Dean Koh | 10:38 pm | November 20, 2019
The technology is being piloted at six NSW Health public hospitals in a range of clinical settings including hospital EDs, wards, clinics and pathology collection centres.
By Mike Miliard | 03:31 pm | November 20, 2019
Erik Decker, chief security and privacy officer at University of Chicago Medicine, describes the value of HHS' Health Industry Cybersecurity Practices framework, which offers workable best practices for the management and mitigation of prevalent threats.
By Max Sullivan | 03:05 pm | November 19, 2019
The Google Cloud Healthcare Data Protection Toolkit can help healthcare organizations chart strategies for HIPAA-aligned data management, the company says.
10:58 am | November 18, 2019
Experts from across the health IT field will share insights about everything from AI and cloud computing to telemedicine and population health.
By John P. Donohue | 04:03 pm | November 15, 2019
Underestimating the impact of organizational culture on your technology plans can lead to costly delays and unplanned outages, says John Donohue, Penn Medicine's associate VP for enterprise infrastructure services.
By Nathan Eddy | 11:36 am | November 15, 2019
Just under half (49 percent) of all post-acute providers surveyed said the state of their staff's health information technology proficiency is either "extremely poor" or "non-existent," a new Black Book report shows.
SPONSORED
By Foxit | 05:37 am | November 06, 2019
The Cura Day Hospitals Group and the US Food and Drug Administration are among institutions to benefit from Foxit’s solutions.
By Bill Siwicki | 03:18 pm | November 05, 2019
The network-based cybersecurity technology acts as an early warning system, giving the CISO and his team a high degree of visibility into network activity.
By Bill Siwicki | 01:29 pm | October 30, 2019
A security expert says discover assets on a network, perform vulnerability assessments, embrace identity governance, perform privileged access management, hire white hat ethical hackers and more.