BUSINESS > Services > Health & Welfare


« Back to News

2018-07-02

Google AI To Predict Patient Healthcare Outcomes

Google has a tool that could forecast patient outcomes, how long they may stay in hospitals, odds of re-admission and chances they will die.

2018-05-23

Meet Tess: The Mental Health Chatbot

Tess is a mental health Chatbot you can connect with in stressful times via an instant-messaging app or a simple text for an immediate response.

2018-05-14

Cyberattacks Focus On Big UK Charities

Charities are highly exposed to online risks: Seven in ten large UK charities have experienced cybersecurity breaches in the last 12 months.

2018-05-09

Hacker Group Targets Healthcare Providers

Orangeworm: Symantec is warning of a new and significantly dangerous international hacker ring targeting large healthcare organisations.

2018-05-04

British Healthcare System Spends £150m Extra On Cybersecurity

A new digital security operations centre will prevent and detect incidents, allowing quicker response times and promoting skills at local level.

2018-04-23

Cyber Attacks Focus On Healthcare

Healthcare is now the most vulnerable industry to data breaches, accounting for 60% percent of all breaches in 2016 at a cost of $1.2 billion.

2018-04-07

Fixing Hacks Has A Deadly Impact On Hospitals

A study from Vanderbilt University shows that remediating data breaches has a very real impact on mortality rates at hospitals.

2018-04-04

Healthcare Security Should Use More Sophisticated Tools

IT staff for healthcare providers must regularly update their cybersecurity practices to keep them ahead of emerging security challenges.

2018-03-27

One A Day: Healthcare Breaches Are A Daily Event

Healthcare data remains under attack and no relief is in sight.

2018-02-16

Chinese Healthcare Technology Moves Ahead

The big tech firms like Alibaba and Tencent have made delivering better healthcare a priority and are more ambitious than their international peers.

2018-02-09

NHS Trusts Failed Cyber Security Assessment

Every single one of the 200 British NHS trusts so far assessed for cyber security resilience has failed an onsite assessment.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Thycotic

Thycotic

Thycotic prevents cyber attacks by securing passwords, protecting endpoints and controlling application access.

National Cyber Security Centre (NCSC) - Norway

National Cyber Security Centre (NCSC) - Norway

NCSC is part of the Norwegian Security Authority, and is Norway's national cyber security hub and the national CERT.

Robert Bosch Centre for Cyber-Physical Systems (RBCCPS)

Robert Bosch Centre for Cyber-Physical Systems (RBCCPS)

RBCCPS is an interdisciplinary research and academic centre within the Indian Institute of Science focused on research in cyber-physical systems.

Ridgeback Network Defense

Ridgeback Network Defense

Ridgeback is an enterprise security software platform that defeats malicious network invasion in real time. Ridgeback champions the idea that to defeat an enemy you must engage them.

iQuila

iQuila

iQuila is a virtual overlay network which runs on top of an existing network. It creates a secure software enabled layer 2 connection across the internet or any public or private cloud.

ISMS.online

ISMS.online

ISMS.online is a cloud software solution for fast & cost-effective implementation of an information security management system and achieve compliance with ISO 27001 and other standards.

Forum of Incident Response & Security Teams (FIRST)

Forum of Incident Response & Security Teams (FIRST)

FIRST is the global Forum of Incident Response and Security Teams.

Liquid Technology

Liquid Technology

Liquid Technology provide DOD- and NIST-compliant data destruction and EPA-compliant e-waste disposal and recycling services throughout North America, Europe and Asia.

Cryptyk

Cryptyk

CRYPTYK CLOUD is the first complete enterprise-class cloud security solution that includes cloud storage and broad protection against all external and internal threats.

Lunio

Lunio

Lunio makes the internet a safer and more reliable place for everyone trying to grow their business by automatically getting rid of fake clicks, traffic, and leads on all ad platforms.

Commonwealth Cyber Initiative (CCI)

Commonwealth Cyber Initiative (CCI)

The Commonwealth Cyber Initiative is establishing Virginia as a global center of excellence at the intersection of security, autonomous systems, and data.

Cymune

Cymune

At Cymune we help businesses to fight against cybercrime, protect patented data and diminish security risks.

IT Solutions Consulting

IT Solutions Consulting

IT Solutions is a full-service IT partner providing managed services and other information technology solutions nationwide.

turingpoint

turingpoint

turingpoint GmbH is a tech enabled boutique consultancy. It was founded by security experts with a focus on cyber security and software solutions.

modePUSH

modePUSH

modePUSH is a cybersecurity company focused on end-to-end breach response from Digital Forensics to Restoration across the enterprise and cloud environments.

DeepStrike

DeepStrike

DeepStrike is a cutting-edge penetration testing company that specializes in providing Penetration Testing as a Service (PTaaS) and continuous penetration testing solutions.