BIOS Hack Detection Added To Dell Enterprise Security Suite
With millions of machines potentially vulnerable to attacks on their BIOS firmware, Dell has introduced a verification tool designed for enterprise IT to monitor users' machines and intervene if an attack is detected. The cloud-based tool takes a different approach than other BIOS offerings on the market.
IoT Shows Its Worth To Businesses
The Internet of Things (IoT) can be used for a diverse set of tasks, including opening up new business models. A recent Forrester report explores how businesses are embracing IoT.
Brave Browser Aims To End Ad-Blocking War
10 Healthcare Wearables, Devices Dominating CES
This year's wearables go beyond basic step counting to measure core health data such as blood pressure, vision quality, and body temperature. At CES 2016, InformationWeek got up close and personal with the latest wave of health-centric devices.
Healthcare IT: Hot Trends For 2016, Part 2
In the second of this two-part series on healthcare IT, we look at the influx of healthcare data and what it will mean for practitioners and IT professionals. In part one, we explored the ways in which advances in patient-focused data collection, wearables, and the Internet of Things will change how doctors and patients communicate.
Healthcare IT: Hot Trends For 2016, Part 1
In the first of this two-part series on healthcare IT, we look at the ways in which advances in patient-focused data collection, wearables, and the Internet of Things will change how doctors and patients communicate. In the second part, we look at the influx of healthcare data, and what it will mean for practitioners and IT professionals.
ORWL Aspires To Be A Secure PC
The small, tamper-resistant device is the focus of a Kickstarter campaign. Olivier Boireau, CEO of Design SHIFT, makers of the ORWL, said he believes the device will appeal to companies interested in privacy and data security.
14 Creepy Ways To Use Big Data
The amount of data being collected about people, companies, and governments is unprecedented. What can be done with that data is downright frightening. From bedrooms to boardrooms, from Wall Street to Main Street, the ground is shifting in ways that only the most cyber-savvy can anticipate. We reveal the creepy ways to use data now and in the near future.
Fitbit Hacked In 10 Seconds
A Fortinet security researcher says the fitness tracker can be hacked by anyone within Bluetooth range. It doesn't matter whether or not it's paired with another device.
Apigee, Ex-CTO Of US Aim To Make EHR Data Access Easier
With backing from former US CTO Aneesh Chopra, Apigee is trying to make healthcare access easier. The API developer is rolling out a new platform that helps bridge some of the interoperability gaps when it comes to electronic healthcare records.
Blue Cross CIO: Big Data Can Fix Healthcare Quality, Costs
The Axis big data initiative at Blue Cross Blue Shield Association incorporates more than $350 billion in annual claims, 36 million provider records, and more than 700,000 BCBS patient reviews, all with the goal of helping healthcare consumers make informed decisions. BCBSA CIO Doug Porter takes us through the project.
8 Epic Software Fails: From Volkswagen To IRS
While Volkswagen's recent software scandal raises serious ethical concerns, it's certainly not the only remarkable software failure this year. Here's a rundown of what can happen when good software goes bad. As we head into fourth quarter 2015, we can't help but wonder what's next.
Keyless Security Not So Secure
A suppressed security paper shines a light on the shortcomings of the cryptography used to protect keyless vehicle access systems.
Online Security: How The Experts Keep Safe
Google researchers have compared the security practices of experts to non-experts, and identified several ways that typical Internet users can improve their online security.
14 Security Fails That Cost Executives Their Jobs
Katherine Archuleta, the director of the Office of Personnel Management, is the latest casualty of a data breach, but she's certainly not the only one. There's no job security when your job is security.
The Threat Of Artificial Intelligence
Super-intelligent robots deserve some concern, but really we should be paying more attention to the people and processes involved in building our machines.
Don't Mug Me For My Password!
In today's information-based world, crooks are targeting mobile devices -- and the data on them. The healthcare industry is particularly vulnerable.