Skip to main content

Privacy & Security

Legislation
By Mike Miliard | 02:42 pm | August 11, 2017
The Every Prescription Conveyed Securely Act, filed in the U.S. House of Representatives, would mandate e-prescribing for controlled substances under Medicare Part D.
Security
By Tom Sullivan | 02:16 pm | August 11, 2017
The group published the guidance to help hospitals define what job roles cybersecurity teams require and, ultimately, to help them find top talent.
Security
By Bill Siwicki | 11:37 am | August 11, 2017
Hackers are trying to reverse-engineer apps and devices to find vulnerabilities.
Cloud Computing
By Tom Sullivan | 04:57 pm | August 10, 2017
Hospitals can use the tech to create blockchain networks with governance, security and other transactional capabilities, the company says.
Security
By Bill Siwicki | 03:57 pm | August 10, 2017
Don’t let that audit turn into a deeper investigation, Deven McGraw said at the Allscripts user conference in Chicago.
Security
By Tom Sullivan | 10:19 am | August 10, 2017
The sector is now making security a top priority, hiring CISOs, undertaking threat management and penetration testing, all more than ever.
Security
By Jessica Davis | 05:00 pm | August 09, 2017
The vulnerability in Windows Search service could let a hacker take complete control over a server or workstation and leverage worm-like spreading capabilities like those found with WannaCry.
Security
By Jessica Davis | 03:29 pm | August 09, 2017
Researcher claims the top security firm is exposing thousands of files from major companies, which are being leaked via its API key from its next-generation anti-malware endpoint detection and response tool.
Security
By Bill Siwicki | 03:01 pm | August 09, 2017
Thomas Zenty suggests those once-futuristic technologies are now closer than many realize. And it’s only a matter of time before Amazon Alexa and Apple Siri come to a hospital near you.
Regulation
By Bill Siwicki | 01:22 pm | August 09, 2017
Inviting hackers to attack your network and then paying them for discovering weaknesses seems dangerous. But the U.S. Department of Defense is succeeding with the practice and some infosec firms are specializing in it.