Privacy & Security
Three healthcare cybersecurity experts showcase the most effectual strategies CIOs and CISOs can take when erecting defenses against criminals seeking valuable patient information.
Email cyberattackers frequently use certain keywords in their subject lines, according to Proofpoint, and tend to send their salvos at certain advantageous times of day.
Strategic Planning
The agency worked for two years with the certification company on a cooperative research project that highlights the value of standards for connected devices and IoMT.
Conflicting regulations and ingrained processes can hamper data sharing – but WebShield can help build networks for secure sharing of sensitive data, says Walter Pistor, the company's director of digital health transformation.
The consultancy, a Service-Disabled Veteran-Owned Small Business, has experience working with the DoD, VA and government healthcare clients and specializes in cybersecurity, agile engineering and more.
A blockchain expert explains for healthcare CIOs and CISOs how the distributed ledger technology can defend telehealth systems against hackers.
During Converge2Xcelerate at the HIMSS Connected Health Conference, a blockchain expert and the CEO of DirectTrust put forth some ideas about how direct ledger technology could help solve a longstanding challenge.
The machine learning tool, which helps to extract data from scanned documents, joins six other AI tools that are HIPAA-eligible: Amazon Translate, Amazon Comprehend, Amazon Transcribe, Amazon Polly, Amazon SageMaker and Amazon Rekognition.
A cybersecurity expert explains the bill, and offers advice on how CIOs and CISOs can overcome some of the challenges it presents.
Ransomware and denial-of-service attacks make headlines when it comes to hospital cybersecurity, but internal cultural and technological vulnerabilities are often more to blame for an ongoing cycle of healthcare data breaches.