The following is a guest article by Dotty Bollinger, JD, Healthcare Compliance Consultant, Compliancy Group The Department of Health and Human Services (HHS)...
Cyberattacks
The following is a guest article by Jatin (JT) Thakkar, General Manager for Global Services and Solutions at Carestream Every day patients trust their health...
The following is a guest article by Peter Newton, Senior Director of Products and Solutions at Fortinet Personal medical and financial data is incredibly...
The following is a guest article by Jonathan Goldberger, Senior Vice President, Security Practices & Strategic Sales at TPx Hospitals face the threat of...
The following is a guest article by Sam Manjarres, Sr. Product Marketing Manager, Identity Security at WatchGuard The healthcare industry is increasingly in...
The following is a guest article by Steven Stone, Head of Rubrik Zero Labs at Rubrik In early August, a ransomware attack disrupted operations across its...
The following is a guest article by Dr. Richard Searle, Vice President of Confidential Computing at Fortanix, Inc. Today’s world is increasingly driven...
The following is a guest article by John Gaede, Director of Information Systems at Sky Lakes Medical Center. Imagine a rural business is the victim of a...
The following is a guest article by Brian Selfridge, Healthcare Cybersecurity & Risk Leader at CORL Technologies. In 2023, healthcare organizations face an...
This week, a team of McAfee researchers released a paper outlining a terrifying exploit. The paper describes, in great technical detail, how a malicious...