BUSINESS > Services > Health & Welfare


« Back to News

2017-07-07

Is It Really Possible to Protect Your Health Data?

It is possible to protect health data, but only if governments, healthcare providers & individuals see it as a top priority. Opinion by Sandra O'Hare.

2017-07-03

Hacking A Chip With A Wave of Your Hand

Electro-magnetic fault injection hacking works and soon it will become important to protect electronic device components from non-invasive hacks.

2017-07-03

Urgent: Investment In NHS Cybersecurity

The Health Service in Scotland needs urgent investment to update legacy systems & preparedness.

2017-06-27

NHS Cyberattack Was 'launched from N. Korea'

The UK's NCSC confirm the view that the Wannacry attack which badly affected the National Health Service was perpetrated by N. Korea.

2017-06-16

Healthcare Sector Accounts For 43% Of UK Data Breaches

UK Information Commissioner data shows that healthcare organisations were consistently top of the list for data breach incidents 2014 - 2016.

2017-06-13

How Cybercrime Affects The Healthcare Industry

Stolen medical records can be used for different types of identity fraud and phishing attack. The threat from these can persist for many years.

2017-06-05

The Internet of Things Will Be Even More Vulnerable to Cyber Attacks

As more smart devices become connected, the world will become more exposed to attacks like the one that hit UK’s NHS. Opinion By Hannah Bryce

2017-05-23

What Healthcare CISOs Should Know

Protected health information (PHI) is more lucrative on the dark web than other form of personally identifiable information.

2017-04-03

DeepMind Uses Blockchain To Track Health Data

Verifiable Data Audit: DeepMind Health will work with the NHS to track patient personal data in real-time.

2017-03-22

Healthcare Starts Spending Big On Cybersecurity

Healthcare organisations are increasing information security spending, reflecting a rapid transition to electronic records & data digitisation.

2017-03-27

Increasing Healthcare Cybersecurity Risks

As healthcare professionals and organisations become more connected via use of IoT and BYOD devices the greater the risk of a major breach.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ASIS International

ASIS International

ASIS International is a global community of security practitioners with a role in the protection of assets - people, property, and/or information.

Cofense

Cofense

Cofense (formerly PhishMe) is a leading provider of human-driven phishing defense solutions.

Cyber Fusion Center - Maryville University

Cyber Fusion Center - Maryville University

Maryville University Cyber Fusion Center is a virtual lab for working on real-world cyber security challenges.

Silent Breach

Silent Breach

Silent Breach specializes in network security and digital asset protection. Services include Pentesting, Security Assessments, Incident Detection & Response, Governance Risk & Compliance.

Blue Lights Digital

Blue Lights Digital

Blue Lights Digital have developed a range of platforms to support digital investigations, as well as providing continued support and education for investigations professionals.

Ntrepid

Ntrepid

Ntrepid products provide protection from web threats and enable organizations to safely conduct their online activities.

KLDiscovery

KLDiscovery

KLDiscovery is a global leader in delivering best-in-class eDiscovery, information governance and data recovery solutions.

CETIC

CETIC

CETIC is an applied research centre in the field of ICT. Key technologies include Big Data, Cloud Computing, the Internet of Things, software quality, and trust and security of IT systems.

eResilience

eResilience

eResilience is a division of Referentia Systems, a pioneer in an ultra-secure information safeguarding technique known as “Enclaving”, in which data can be segmented and protected within a network.

CyberSN

CyberSN

CyberSN is your essential partner in cybersecurity workforce risk management offering solutions that empower leaders to diversify, acquire, retain, and develop their cybersecurity teams.

Alias Robotics

Alias Robotics

Alias Robotics is a robot cyber security company. We deliver cyber security solutions for robots and robot components.

Axio Global

Axio Global

Axio is a leading cyber risk management SaaS company. Our Axio360 platform gives companies visibility to their cyber risk, and enables them to prioritize investments to protect their business.

10dot Cloud Security

10dot Cloud Security

10dot Cloud Security is a security service management company. Our solutions give you contextualised visibility into your network security.

ShieldIO

ShieldIO

ShieldIO Real-Time Homomorphic Encryption™ enables your organization to reach regulatory compliance without compromising data availability.

Ingenics Digital

Ingenics Digital

Ingenics Digital is a recognized initiator and leading service provider in the areas of software development and embedded systems.

Vana Solutions

Vana Solutions

Vana Solutions is an Information Technology Services company. We help commercial & federal organizations select, adapt, and integrate the right technology solution so you can move faster.