Flaws in Google’s Android operating system mean the factory-reset option is unlikely to permanently wipe all your data -- or master token -- from the device.By Nathan Eddy Freelance Writer, 5/25/20153 comments | Read | Post a Comment
Palm vein scans are helping staff pull up patient records more efficiently and securely. One of eight Elite 100 Business Innovation award winners. By Curtis Franklin Jr. Executive Editor, Technical Content, 4/28/20151 Comment | Read | Post a Comment
Apple's ResearchKit is an open-source framework designed for the healthcare and fitness markets as a way to collect data and analyze larger groups of patients. By Nathan Eddy Freelance Writer, 4/15/20153 comments | Read | Post a Comment
Hospitals and medical device manufacturers need to start doing more to detect and thwart incoming attacks on networks and devices.By Liviu Arsene Senior E-threat Analyst, Bitdefender, 4/10/20153 comments | Read | Post a Comment
Early testers of the Apple Watch suggest it is the best smartwatch yet, but they admit that people don't necessarily need smartwatches. That is, at least not yet.By Eric Zeman , 4/8/20155 comments | Read | Post a Comment
Join us for a roundup of the biggest stories from a big week at InformationWeek.com for the week of Feb. 1.By Curtis Franklin Jr. Executive Editor, Technical Content, 2/5/20151 Comment | Read | Post a Comment
CloudPassage CTO Amrit Williams details five steps to achieve a level of cloud security that goes beyond mere compliance.By Amrit Williams CTO, Cloud Passage, 1/29/20150 comments | Read | Post a Comment
Does every healthcare department really need around-the-clock access to every file or image, or could security be tightened?By Jutta Williams Corporate Information Assurance Officer and Chief Compliance Officer, Health First, 12/29/20143 comments | Read | Post a Comment
In today's information-based world, crooks are targeting mobile devices -- and the data on them. The healthcare industry is particularly vulnerable.By Jutta Williams Corporate Information Assurance Officer and Chief Compliance Officer, Health First, 12/22/20146 comments | Read | Post a Comment
With data breaches growing, 2015 promises to be the healthcare industry's most challenging security year yet. These nine areas demand attention in 2015.By Alison Diana Senior Editor, 12/10/20144 comments | Read | Post a Comment
Google's revised reCAPTCHA test promises to help website users solve security puzzles faster -- unless they are using a browser's private mode or some other privacy measure.By Thomas Claburn Editor at Large, Enterprise Mobility, 12/3/20142 comments | Read | Post a Comment
With the rise of data and the increasing importance of how it's handled, chief data officers have become a popular addition across industries. Healthcare organizations need CDOs just as much, say experts.By Alison Diana Senior Editor, 12/2/20144 comments | Read | Post a Comment
Federal agencies are trying to address threats to the privacy and security of people using connected medical devices.By Philip Desjardins Counsel, Arnold & Porter, 12/1/20140 comments | Read | Post a Comment
Security breach that exposed personal data on 4.5 million Tennessee healthcare system patients offers key lessons to prevent similar cyber attacks.By Paula Knippa Attorney, 11/25/20149 comments | Read | Post a Comment
The Office of Civil Rights is not out to get you. But it does expect you to make good-faith efforts at protecting patient data.By Mark Fulford Partner at LBMC’s Security & Risk Services, 11/21/20142 comments | Read | Post a Comment
Privacy certification company has agreed to pay $200,000 to settle FTC charges that it deceived consumers.By Thomas Claburn Editor at Large, Enterprise Mobility, 11/17/20140 comments | Read | Post a Comment
Healthcare Data Breaches Cost More Than You ThinkHealthcare providers just don't get it. They refuse to see the need to fully secure their protected health information from unauthorized users -- and from authorized users who abuse their access privileges. As a result, they don't allocate enough budgetary resources for securing medical data.
Dark Reading Threat Intelligence Survey Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.
. We've got a management crisis right now, and we've also got an engagement crisis. Could the two be linked? Tune in for the next installment of IT Life Radio, Wednesday May 20th at 3PM ET to find out.