The Food & Drug Administration has issued new guidance on the radio frequency of wireless medical devices, including recommending authentication and encryption for reducing patient safety risks.
Microsoft touts new security features built into the Windows 8.1 Enterprise operating system. But are they enticing enough to win over organizations that are reluctant to upgrade from older OS versions?
A judge finds WikiLeaks leaker Bradley Manning not guilty of aiding the enemy but convicts him on other charges. How will the mixed verdict sway NSA whistleblower Edward Snowden's decision on whether to remain on the lam?
Mobile clinics using telemedicine to deliver care to children face the same security challenges as those facing other healthcare delivery settings, says Jeb Weisman, CIO of the Children's Health Fund.
White hat hacker Barnaby Jack, who passed away July 25, will be remembered for his demonstrations that dramatically spotlighted the vulnerabilities of ATMs and medical devices.
A big security mistake medical device vendors make is failing to adequately address that their wireless products will connect to other systems, says security expert Jay Radcliffe, who has reported concerns about insulin pumps to the FDA.
The author of the forthcoming book "Secrets and Leaks" explains why the acts of NSA whistleblower Edward Snowden don't carry the same weight as those of Pentagon Papers leaker Daniel Ellsberg.
What are the emerging security vulnerabilities for mobile devices? Anti-phishing expert Dave Jevans provides insights based on new mobile threat research.
What can the Food and Drug Administration do to improve the security of medical devices? Sharon Finney, data security leader at Adventist Health System, offers her insights and also describes her organization's security efforts.
New state health insurance exchanges will face many security and privacy hurdles. But ensuring that consumer information is secure with data handlers on the front end is a critical first step.
An employee of the New York state agency that investigates Medicaid fraud is being investigated after the individual allegedly sent 17,743 records to the worker's personal e-mail account.
Healthcare organizations aren't performing enough analysis of user behavior to detect possible insider threats, says security consultant Mac McMillan, who outlines the importance of auditing for abnormalities.
What are the top three cybersecurity game changers, and what negative impact can they have on organizations if security leaders do not manage them properly? Rolf von Roessing of ISACA shares insight.
Partners HealthCare is integrating patients' remote monitoring data from medical devices into their electronic health records. But what are the essential security steps for this project?
In complying with the HIPAA Omnibus Rule, covered entities need to demand that their business associates are protecting patient information stored on mobile devices, says consultant Bill Miaoulis.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.