Healthcare Data Security & Privacy News & Analysis - InformationWeek
IoT
IoT
Healthcare // Security & Privacy
News & Commentary
FireEye CEO Shares State of IT Threat Landscape
InformationWeek Staff,
SatireVideo
FireEye CEO Kevin Mandia talks about the state of the IT threat landscape and where enterprises should focus their attention when it comes to cybersecurity.
By InformationWeek Staff , 6/23/2017
Comment0 comments  |  Read  |  Post a Comment
AI Works Better with Human Intelligence, Too
Jessica Davis,  Senior Editor, Enterprise Apps
Satire
In healthcare, machine learning may yield fast, accurate insights. But humans are still better able to detect ridiculous anomalies and discover problems that machines have not yet learned to detect.
By Jessica Davis Senior Editor, Enterprise Apps, 5/18/2017
Comment2 comments  |  Read  |  Post a Comment
5 Best Practices for Maximizing Health IT Security
Guest Commentary, Guest Commentary
Commentary
Hospitals, their devices, and their data are prime targets for hackers, particularly when the tactic is ransomware.
By Trent R. Hein, VP and co-founder of AppliedTrust , 5/3/2017
Comment1 Comment  |  Read  |  Post a Comment
Future of Data Summit: Secure IoT with Blockchain
Jessica Davis,  Senior Editor, Enterprise Apps
Satire
IoT security is essential for the Internet of Things to reach commercial success. Here's one way to protect this technology and data from hackers.
By Jessica Davis Senior Editor, Enterprise Apps, 4/11/2017
Comment5 comments  |  Read  |  Post a Comment
How to Avoid Big Data Mistakes
Jessica Davis,  Senior Editor, Enterprise Apps
News
If data is important to your company, then creating a data governance program is as essential to the business as an accounting program.
By Jessica Davis Senior Editor, Enterprise Apps, 2/27/2017
Comment2 comments  |  Read  |  Post a Comment
IT Priorities Shifting Toward Security, Managing Costs
Charles Babcock, Editor at Large, Cloud
News
A recent IDG survey shows CIOs and IT managers have a renewed concern for operational security and improved customer experience.
By Charles Babcock Editor at Large, Cloud, 11/11/2016
Comment1 Comment  |  Read  |  Post a Comment
Healthcare's Looming Disruption: How Can IT Prepare?
Jessica Davis,  Senior Editor, Enterprise Apps
News
A new Gartner Maverick report says that annual physical medical exams and primary care doctors are about to be disrupted by IoT medical devices and algorithm. Here's how IT must shift to accommodate the change.
By Jessica Davis Senior Editor, Enterprise Apps, 10/31/2016
Comment20 comments  |  Read  |  Post a Comment
Top 125 Vendors To Watch
InformationWeek Staff,
Commentary
InformationWeek and its sister publications Dark Reading and Network Computing have teamed up to bring you a roundup of the hottest vendors in cloud, data management, DevOps, infrastructure, and security. The 125 vendors you'll find here range from established players making strides in their markets to newcomers setting the stage for the future.
By InformationWeek Staff , 9/27/2016
Comment1 Comment  |  Read  |  Post a Comment
IT Asset Protection: How One Colocation Provider Does It
Thomas Claburn, Editor at Large, Enterprise Mobility
News
For colocation provider vXchnge, security isn't just a matter of strong defenses. It also involves planning for the worst.
By Thomas Claburn Editor at Large, Enterprise Mobility, 8/18/2016
Comment0 comments  |  Read  |  Post a Comment
10 IoT Security Best Practices For IT Pros
Thomas Claburn, Editor at Large, Enterprise Mobility
News
IT professionals have to treat internet of things (IoT) vulnerabilities as they would vulnerabilities in databases or web applications. Any flaw can bring unwelcome attention, for those making affected products and those using them. Any flaw may prove useful to compromise other systems on the network. When everything is connected, security is only as strong as the weakest node on the network.
By Thomas Claburn Editor at Large, Enterprise Mobility, 8/9/2016
Comment5 comments  |  Read  |  Post a Comment
Google's Cloud Lets You Bring Your Own Encryption Keys
Thomas Claburn, Editor at Large, Enterprise Mobility
News
By supplying their own encryption keys, organizations can reduce the chance that an outside party will be able to gain access to their data, at least while it's at rest. Now Google's cloud platform offers the option.
By Thomas Claburn Editor at Large, Enterprise Mobility, 8/3/2016
Comment0 comments  |  Read  |  Post a Comment
HPE Reportedly Considers Going Private
Jessica Davis,  Senior Editor, Enterprise Apps
News
Has HPE put itself or its software business up for sale? Multiple reports note that a group of private equity companies are interested in buying the software business, or taking the entire company private. What would either deal mean for IT?
By Jessica Davis Senior Editor, Enterprise Apps, 8/2/2016
Comment2 comments  |  Read  |  Post a Comment
9 Promising Cloud Security Startups To Watch
Thomas Claburn, Editor at Large, Enterprise Mobility
News
The future belongs to cloud computing, but only with the help of strong security. Here are 9 cloud security startups IT managers may want to consider.
By Thomas Claburn Editor at Large, Enterprise Mobility, 7/31/2016
Comment0 comments  |  Read  |  Post a Comment
Using AI To Fight Cyberthreats
Thomas Claburn, Editor at Large, Enterprise Mobility
News
SparkCognition, working with Carnegie Mellon and IBM's Watson, aims to provide cyber-security researchers with better threat data using predictive models powered by machine learning.
By Thomas Claburn Editor at Large, Enterprise Mobility, 7/27/2016
Comment2 comments  |  Read  |  Post a Comment
Lawsuit Raises Questions About The Right To Tinker With Tech
Thomas Claburn, Editor at Large, Enterprise Mobility
News
The Electronic Frontier Foundation has filed a lawsuit to overturn a provision in the Digital Millennium Copyright Act which limits the modification of technology. For anyone managing information technology, the law in question has the potential to limit access to data, to weaken security, and to impose unnecessary burdens, costs, and liabilities.
By Thomas Claburn Editor at Large, Enterprise Mobility, 7/25/2016
Comment1 Comment  |  Read  |  Post a Comment
Flaws Found In 'Right To Be Forgotten' Data Privacy Laws
Thomas Claburn, Editor at Large, Enterprise Mobility
News
A study by privacy researchers finds that attempts to obscure online information can be defeated with a bit of effort.
By Thomas Claburn Editor at Large, Enterprise Mobility, 7/20/2016
Comment1 Comment  |  Read  |  Post a Comment
IBM's Cloud, Analytics Investments Start Paying Off
Jessica Davis,  Senior Editor, Enterprise Apps
News
IBM's second quarter total revenues and earnings per share declined again, but executives and analysts put their focus on the company's strategic initiatives, which showed continued growth in the most recent quarter.
By Jessica Davis Senior Editor, Enterprise Apps, 7/19/2016
Comment1 Comment  |  Read  |  Post a Comment
Can Big Data Help Cure Cancer?
Jessica Davis,  Senior Editor, Enterprise Apps
News
Genomic research and precision medicine are on the leading edge of cancer research and treatment, but the huge size of the data sets and the complexity of sharing those data sets among researchers thwarts progress. Here's one project that is aiming to remove those obstacles.
By Jessica Davis Senior Editor, Enterprise Apps, 7/19/2016
Comment4 comments  |  Read  |  Post a Comment
EU Data Protection Law May End The Unknowable Algorithm
Thomas Claburn, Editor at Large, Enterprise Mobility
News
Slated to take effect as law across the EU in 2018, the General Data Protection Regulation could require companies to explain their algorithms to avoid unlawful discrimination.
By Thomas Claburn Editor at Large, Enterprise Mobility, 7/18/2016
Comment0 comments  |  Read  |  Post a Comment
10 Hot SaaS Security Startups To Watch
Andrew Froehlich, President & Lead Network Architect, West Gate Networks
News
Leveraging cloud-based security services is helping to solve some major stumbling blocks when it comes to providing a robust architecture for organizations. To help you navigate your options, we're spotlighting 10 SaaS security startups whose tools are worth a look.
By Andrew Froehlich President & Lead Network Architect, West Gate Networks, 7/13/2016
Comment0 comments  |  Read  |  Post a Comment
More Stories
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll