Security

Page: 3

How to Identify the Right Patient (and Whisky) With only a few weeks to go to the annual HIMSS conference in Orlando I took the opportunity to catch up with Vince Vitali, the VP of Strategy and Business Development at Nextgate to review the current trends and hear about their special event planned at the […]

Read

Open Clinical Systems This months episode of “News you can Use” in the traditions of “Ask Me Anything” on HealthcareNOWRadio features news from the month of October 2019 You can read more about the series here and the concept of keeping up with innovating in healthcare. Please send me your suggestions on topics you’d like to see covered. You can […]

Read

The recent “cloud deal” signed between Ascension and Google has raised a lot of discussion and concern over the privacy of patients data – in this case perhaps as many as 50 million patients. You can get a good sense of the background and details from this piece on CNBC Google’s hospital data-sharing deal raises […]

Read

Data Sharing and Clinical Sleuthing This months episode of “News you can Use” in the traditions of “Ask Me Anything” on HealthcareNOWRadio features news from the month of October 2019 You can read more about the series here and the concept of keeping up with innovating in healthcare. Please send me your suggestions on topics you’d like to see covered. […]

Read

National Patient Identifier This week I am talking to Dan Cidon (@dcidon), Chief Technology Officer at NextGate (@Nextgate) who is a mechanical engineer by training but found himself on a path of identification of people in the support of  the delivery of healthcare. We talked about what some consider a “third-rail” topic – a national patient identifier. […]

Read

Your Internet, Your Access We are dependent on our pipe/connection to the information highway, the internet. But who controls and manages that pipe continues to impact what you have access to, the information you see and hear and ultimately who gets to succeed in our new world. So it has been surprising to watch as […]

Read

Don’t Let Your Guard Down It seemed perfectly legitimate and was cleverly assembled into a request from someone I do know in my network, had met and we had communication in the past…. but it was not Over the course of the next 90 minutes, I managed to compromise 3 separate accounts of my own […]

Read

This months episode of “News you can use” in the traditions of “Ask Me Anything” on HealthcareNOWRadio features news from the month of September 2019 You can read more about the series here and the concept of keeping up with innovating in healthcare. Please send me your suggestions on topics you’d like to see covered. You can reach out […]

Read

Humans the Weakest Link in Security   As humans, we are programmed with compassion and a desire to help but this human nature is the foundation of many of the risks that we are exposed to in the digital and cloud filled data world we all inhabit now. Our personal programming and desire to help […]

Read

Keeping Up With Innovation in Healthcare Starting this month I will be running a monthly review of “News you can Use” in the traditions of “Ask Me Anything” on HealthcareNOWRadio You can listen in to the first episode and read more about it here where I discuss topics ranging from Healthcare insurance and surprise billing, […]

Read

The World is Not Imploding with Violence As if things were not bad enough already with the never ending news cycle that shares the terrible events of the last 1/2/12/24 hours I read this morning that Ring from Amazon and their associated Neighbors application are inking deals with local police and emergency services to gain […]

Read

Secure Your Digital Life I can’t tell you the number of times I hear people tell me there’s no need to worry about being hacked – why would anyone ever be interested in me Well that’s true they are not, but they are interested in your accounts, your identity, and your money and they get to […]

Read

You’ve Been Cloned Have you had the misfortune of finding an account that has duplicated your life and details and set up as if they are you – if not I’m going to suggest it’s just a matter of time. I have, multiple times and it’s not pleasant and hard to stop – there is […]

Read

Saving Healthcare Quality This week I am talking to Fred Trotter (@fredtrotter), CTO CareSet Systems – the first commercial Medicare Data company. Fred has a long and fascinating background that unlike many healthcare Cybersecurity experts started in the security field and transitioned to healthcare and healthcare data. You can read his musings on Hacking Healthcare […]

Read

Healthcare’s Security Posture As part of my interview series from BlackHat I spoke with Mike Weber VP Coalfire Labs – they are a large Cybersecurity Systems provider focused on securing transactions in the cloud working with all if not most of the cloud providers. Coalfire just released their Penetration Risk Report that included a special section on […]

Read

Encryption Algorithms Under Siege Over the course of history, the development and subsequent breaking of encryption standards have been a constant cycle. As new keys were developed so they were broken and the speed of with which new keys were broken has increased. Modern day encryption “Data Encryption Standard” or DES was launched int he […]

Read

Hospital Paging Systems Security I spoke with Mark Nunnikhoven, VP of Cloud Research at Trend Micro talking about their recently published paper: Leaking Beeps: Unencrypted Pager Messages in the Healthcare Industry which were designed and built in an era when it took a lot of resources and technology to access the system but now all it takes a couple hundred […]

Read

Security by Default The opening Keynote by Parisa Tabriz | Director of Engineering, Google: Optimistic Dissatisfaction with the Status Quo: Steps We Must Take to Improve Security in Complex Landscapes covered the journey taken by Google to bring the status of browsing into the Security age. It was sobering to see that a company like Google with the […]

Read

Hollywood Future Predictions Spoiler Alert – for anyone who has not watched the Showtime series “Homeland” or not got past Season 2 In the episode titled “Broken Heart” (December 2, 2012) we watch a hacker gain remote unauthorized access to the Vice Presidents Pacemaker and induces a tachycardia (increase in the heart rate) causing him to […]

Read

  Your Data but Who Owns It This excellent piece by ProPublica and NPR: Health Insurers Are Vacuuming Up Details About You — And It Could Raise Your Rates is part of a series – The Health Insurance Hustle by Marshall Allen that offers insights into the data-rich world we are entering and how this information may well be […]

Read

In the lead up to BlackHat and DefCon conferences, I am talking to one of the leaders in the space of security and the innovator who created and runs the outstanding security resource HaviBeenPwned (HIBP) Troy Hunt (@TroyHunt). He is an author of multiple top-rated courses on web security on Pluralsights and highly sought after speaker. The Ethics […]

Read

Ari Lightman – Finding Insights from Digital Data This week I am talking to Ari Lightman, Professor at the HJ Heinz College at Carnegie Mellon University where he teaches a class at the intersection of marketing and IT including Digital Transformation, Principles of Marketing and Measuring Social He shares insights on how we can smooth the transition […]

Read

  Patient Status Critical The threat level in Cyberspace keeps rising as evidenced by the recent alerts issued by the US Government (TA18-074A) and the long list of indicators of Compromise (IOC) Targeting critical infrastructure with an extensive list of tools, attacks, and techniques. While this is not new, with cases dating back to Stuxnet in 2007 […]

Read

What are my BigIdeas2018 for the healthcare industry? They revolve around 3 topics: Security, Data, and Virtual care Technology continues to move at an exponential pace, leaving virtually no industry untouched. Healthcare is no exception – the technological progress in this space is offering incredible opportunities to improve the health of our population, reduce costs […]

Read

    The Desire to Help and Security We are programmed with a desire to help others in need but this trait is one of the reasons that hackers are so successful infiltrating our networks as I mentioned in this post. This past week the Black Hat conference took place followed by DefCon (in its 25th year) […]

Read



Search
%d bloggers like this: