BUSINESS > Services > Health & Welfare


« Back to News

2017-03-09

Healthcare Staff Trigger Google Cyber Defense

So many of the UK’s National Health Service (NHS) staff are using Google's search engine they have triggered its cybersecurity defences.

2017-02-24

2016 Healthcare Data Breaches

The number of US companies admitting to suffering Data Breaches went up 40% in 2016. Healthcare organisations were among the most vulnerable.

2017-02-21

GoggleBox: Moderate Screen Use 'Boosts Teen Wellbeing'

A study of screen time and mental wellbeing among teenagers suggests moderate use of devices may be beneficial in a connected world.

2017-02-14

Stolen Health Records Flooding Dark Web Markets

The large amount of stolen patient data posted for sale to the dark web in recent months has caused prices for most of those records to drop.

2017-02-06

'Locked-in' Patients Enabled To Communicate

A brain-computer interface can read the thoughts of patients suffering Locked-In syndrome to answer simple yes-or-no questions.

2017-02-03

Why Are Hackers After Healthcare Records?

Information hacked from a Financial Institution or Bank is quickly rendered useless. Classified Healthcare data has continued value lasting a lifetime.

2017-01-27

British NHS Hospital Trust Under Cyber Attack

The largest National Health Service hospital trust in England has been infected with a virus affecting thousands of sensitive files.

2017-01-11

The Digital Transformation Of The Humanitarian Sector

No industry is immune to being disrupted by technology. And that includes conflict and humanitarian relief. Opinion by Anje Kaspersen

2016-12-21

Healthcare Data Breaches In 2017 Will Get Worse

Personal medical data is among the most valuable kinds of information to hackers and healthcare managers pay handsomely to get it back.

2016-12-19

Medical Implants Can be Hacked

Research shows it is possible to transmit life-threatening signals to implanted medical devices with no prior knowledge of how the devices work.

2016-12-02

IBM’s Watson Will Use AI To Treat Cancer

The Watson artificial intelligence platform is being deployed to study how thousands of cancers mutate to become resistant to drug treatments.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Reed Smith LLP

Reed Smith LLP

Reed Smith LLP is an international law firm with offices in the USA, Europe, Middle East and Asia. Practice areas include Information Technology, Privacy & Data Security.

Forcepoint

Forcepoint

Forcepoint provide a unified, cloud-centric platform that safeguards users, networks and data while eliminating the inefficiencies of managing multiple point security products.

Aptive Consulting

Aptive Consulting

Aptive is a cyber security consultancy providing Penetration Testing and Vulnerability Assessment services.

KE-CIRT/CC

KE-CIRT/CC

KE-CIRT/CC is the national Computer Incident Response Team for Kenya.

Communications Security Establishment (CSE)

Communications Security Establishment (CSE)

CSE is Canada's national cryptologic agency, providing the Government of Canada with IT Security and foreign signals intelligence (SIGINT) services.

IAC

IAC

IAC is a specialist Irecruitment consultancy covering Internal Audit, Risk, Controls, Governance, IT Audit, and Cyber Security roles.

Alpine Security

Alpine Security

Alpine Security provides penetration testing, security assessments and cybersecurity training services.

Human Security

Human Security

Human (formerly White Ops) Bot Mitigation Platform enables complete protection from sophisticated bot attacks across advertising, marketing and cybersecurity.

CyberSheath Services International

CyberSheath Services International

CyberSheath integrates your compliance and threat mitigation efforts and eliminates redundant security practices that don’t improve and in fact might probably weaken your security posture.

KETS Quantum Security

KETS Quantum Security

KETS harnesses the properties of quantum mechanics to solve challenging problems in randomness generation and secure key distribution and enable ultra secure communications.

Blumira

Blumira

Blumira provides comprehensive, hybrid cloud security monitoring and reporting for organizations of all sizes, enabling them to detect and respond to cloud security threats quickly and effectively.

National Academy of Cyber Security (NACS) - India

National Academy of Cyber Security (NACS) - India

National Academy of Cyber Security provides Professional Training Courses and Programmes in Cyber Security.

Trovent Security

Trovent Security

Trovent was founded with a clear goal: to support medium-sized companies in significantly increasing their IT security level.

Knostic

Knostic

Knostic is an early stage startup developing a risk management and governance platform designed for enterprise large language models (LLM).

Alcatel-Lucent Enterprise (ALE)

Alcatel-Lucent Enterprise (ALE)

We are Alcatel-Lucent Enterprise. Our mission is to make everything connect with digital age networking, communications and cloud solutions.

St Fox

St Fox

St. Fox is a leading consultancy helping enterprises secure their Cloud, Data, endpoints, and applications.