Healthcare Security

Page: 3

Secure Your Digital Life I can’t tell you the number of times I hear people tell me there’s no need to worry about being hacked – why would anyone ever be interested in me Well that’s true they are not, but they are interested in your accounts, your identity, and your money and they get to […]

Read

Saving Healthcare Quality This week I am talking to Fred Trotter (@fredtrotter), CTO CareSet Systems – the first commercial Medicare Data company. Fred has a long and fascinating background that unlike many healthcare Cybersecurity experts started in the security field and transitioned to healthcare and healthcare data. You can read his musings on Hacking Healthcare […]

Read

Healthcare’s Security Posture As part of my interview series from BlackHat I spoke with Mike Weber VP Coalfire Labs – they are a large Cybersecurity Systems provider focused on securing transactions in the cloud working with all if not most of the cloud providers. Coalfire just released their Penetration Risk Report that included a special section on […]

Read

Encryption Algorithms Under Siege Over the course of history, the development and subsequent breaking of encryption standards have been a constant cycle. As new keys were developed so they were broken and the speed of with which new keys were broken has increased. Modern day encryption “Data Encryption Standard” or DES was launched int he […]

Read

Hospital Paging Systems Security I spoke with Mark Nunnikhoven, VP of Cloud Research at Trend Micro talking about their recently published paper: Leaking Beeps: Unencrypted Pager Messages in the Healthcare Industry which were designed and built in an era when it took a lot of resources and technology to access the system but now all it takes a couple hundred […]

Read

Hollywood Future Predictions Spoiler Alert – for anyone who has not watched the Showtime series “Homeland” or not got past Season 2 In the episode titled “Broken Heart” (December 2, 2012) we watch a hacker gain remote unauthorized access to the Vice Presidents Pacemaker and induces a tachycardia (increase in the heart rate) causing him to […]

Read

  Your Data but Who Owns It This excellent piece by ProPublica and NPR: Health Insurers Are Vacuuming Up Details About You — And It Could Raise Your Rates is part of a series – The Health Insurance Hustle by Marshall Allen that offers insights into the data-rich world we are entering and how this information may well be […]

Read

Ari Lightman – Finding Insights from Digital Data This week I am talking to Ari Lightman, Professor at the HJ Heinz College at Carnegie Mellon University where he teaches a class at the intersection of marketing and IT including Digital Transformation, Principles of Marketing and Measuring Social He shares insights on how we can smooth the transition […]

Read

  Patient Status Critical The threat level in Cyberspace keeps rising as evidenced by the recent alerts issued by the US Government (TA18-074A) and the long list of indicators of Compromise (IOC) Targeting critical infrastructure with an extensive list of tools, attacks, and techniques. While this is not new, with cases dating back to Stuxnet in 2007 […]

Read

Diverse Engaging and Eclectic What other conferences can you attend that offers you exercise and revitalization programs, alongside engaging presentations from key leaders in some of the top companies in pharmaceuticals, technology, healthcare and a demonstration environment packed with the latest and greatest innovations and technologies? The CNS Summit – now in its 8th year […]

Read

What are my BigIdeas2018 for the healthcare industry? They revolve around 3 topics: Security, Data, and Virtual care Technology continues to move at an exponential pace, leaving virtually no industry untouched. Healthcare is no exception – the technological progress in this space is offering incredible opportunities to improve the health of our population, reduce costs […]

Read

    The Desire to Help and Security We are programmed with a desire to help others in need but this trait is one of the reasons that hackers are so successful infiltrating our networks as I mentioned in this post. This past week the Black Hat conference took place followed by DefCon (in its 25th year) […]

Read



Search
%d bloggers like this: