This was an eventful year for healthcare cybersecurity and privacy incidents and developments. But what's ahead for 2019? Here are eight predictions from privacy and security expert Rebecca Herold.
GDPR compliance. New uses for blockchain. IoT security. These are some of the hottest topics on tap at the 2018 RSA Conference, taking place April 16-20 in San Francisco.
Vulnerable firmware has been highlighted again in a range of low-cost Android phones, raising concerns over their security. This latest incident comes 11 months after security analysts first raised flags.
Neutering the army of web-connected devices used in the large internet attack that hampered access to major sites - including Amazon, PayPal, Spotify and Twitter - is technically possible. But no option offers either a great or near-term fix.
Cyber-insurance holds promise for enterprises looking to suitably cover risk in an unpredictable, and rapidly evolving information security landscape. Dinesh Bareja shares his thoughts on setting the groundwork.
"Align technology with businesses" is an old phrase. But information security is now part of this change, making strides to align with growth as a business enabler. Enter: the converged technology operations center.
With the White House set to issue its cybersecurity framework next month, a former CIA chief information security information officer vividly explains why the set of best IT security practices won't necessarily protect the nation's critical infrastructure.
What can hospitals and other organizations do to address the security issues associated with biomedical devices? A security expert describes two important steps to take.
Healthcare organizations should take steps to ensure that their medical devices aren't inadvertently exposed to security and patient safety risks on the Internet. Here's how to get started.
CISO Mark Olson of Beth Israel Deaconess Medical Center offers detailed insights on the specific steps that medical device manufacturers can take to help ensure data security.
In the rush to allow personal devices to be used for work, we in application security neglected to examine thoroughly the new risks external applications may introduce to our organizations.
The CISO of Beth Israel Deaconess Medical Center calls on the Food and Drug Administration to take bold action to help ensure the security of medical devices, which are vulnerable to malware.
As mobile devices become ubiquitous, more precautionary measures are needed to ensure confidentiality. To prevent data breaches, organizations need to take five essential steps.
As mobile devices become ubiquitous in healthcare, more precautionary measures are needed to ensure patient confidentiality. To prevent data breaches, hospitals, clinics and others need to take five essential steps.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing devicesecurity.io, you agree to our use of cookies.