BUSINESS > Services > Health & Welfare


« Back to News

2016-02-03

Healthcare Data Is The Holy Grail for Cyber Thieves

Sophisticated hackers looking to lift the treasure trove of information found in health records are now the leading cause of data loss.

2016-01-26

Education: Introvert Personalities Go Mobile & Online

Educators are making the transition to tech-enabled discussions.

2016-01-20

Hefty Fine Over False Encryption Claims

Dental software company pays a penalty for misleading customers on the level of encryption it provided to protect sensitive patient data.

2015-12-14

The Future Of Healthcare Systems Is ‘Unsexy Plumbing’

The technology companies that can get data integration right will be healthcare’s true change-makers.

2015-11-11

Conditional Clearance For Hackers To Test Automotive & Healthcare Security

U.S. Researchers will be able to look for flaws in software running on cars and medical devices without fearing legal action.

2015-10-06

Medical Devices Vulnerable to Hackers

Thousands of critical medical systems, such as MRI machines, are available for hackers to access online.

2015-09-22

FBI Urges Firms to Plan For Cyber Attack

An FBI security expert calls on businesses of all sizes to make a cyber incident response plan to combat the big increase in global security threats.

2015-09-16

Should the US Use Hidden Data to Warn Industry of Attacks?

What is government’s role in leveraging the “Dark Web” to alert private-sector organizations they’re the target for attack?

2015-09-21

Cybersecurity Is A Competition Issue For Business

Companies need to start thinking about how to measure and prepare for the real, business impacts of cyber threats.

2015-08-14

Hacking Critical Infrastructure: How-To Guide

Cyber-aided physical attacks on critical infrastructure is a growing concern. How to pull them off and how to defend against them.

2015-08-10

Medical Devices are Vulnerable to Hackers

Cars. Planes. Phones. Now vulnerabilities in the infusion devices that hospitals use to administer intravenous drugs are identified.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ON-DEMAND WEBINAR: Future-proof your security with Secure Access Service Edge (SASE)

ON-DEMAND WEBINAR: Future-proof your security with Secure Access Service Edge (SASE)

Watch this webinar to explore the Security orchestration, automation, and response (SOAR) paradigm, its relationship with organization IT practices, and its role in your security strategy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Pen Test Partners LLP

Pen Test Partners LLP

Pen Test Partners provides penetration testing, security assessment and training services.

CyberSecurityJobsite.com

CyberSecurityJobsite.com

CyberSecurityJobsite.com is a specialist job board designed to attract candidates working within Cyber Security, Information Security or Information Assurance.

CyberSecurity Malaysia

CyberSecurity Malaysia

CyberSecurity Malaysia is the national cyber security specialist agency under the Ministry of Science, Technology and Innovation (MOSTI).

Visa

Visa

Visa is a global payments technology company that connects consumers, businesses and banks in more than 200 countries and territories worldwide.

Auth0

Auth0

Auth0 is a cloud service that provides a set of unified APIs and tools that instantly enables single sign-on and user management for any application, API or IoT device.

Me Learning

Me Learning

Me Learning provides engaging, informative and clearly explained learning materials for complex and challenging professional environments in areas including GDPR and Information Governance.

Greenetics Solutions

Greenetics Solutions

Greenetics Solutions is a company focused on providing solutions for information security.

MagicCube

MagicCube

MagicCube is a device independent IoT security platform that protects against on-device, cloud, and network attacks.

AnChain.AI

AnChain.AI

AnChain.AI's analytics platform proactively protects crypto assets by providing proprietary artificial intelligence, knowledge graphs, and threat intelligence on blockchain transactions.

Ensurity Technologies

Ensurity Technologies

Ensurity is a deep-tech cybersecurity engineering company; designs and manufactures specialized secure hardware, software, and mobile application solutions.

FYEO

FYEO

FYEO is a threat monitoring and identity access management platform for consumers, enterprises and SMBs.

Cyber Coaching

Cyber Coaching

Cyber Coaching is a community for enhancing technical cyber skills, through unofficial certification training, cyber mentorship, and personalised occupational transition programs.

Pacific Global Security Group

Pacific Global Security Group

Pacific Global Security Group offers an intelligence-driven focus on all aspects of cybersecurity for IT/ICS/OT.

Computacenter

Computacenter

Computacenter is a leading independent technology partner, trusted by large corporate and public sector organisations. We help our customers to source, transform and manage their IT infrastructure.

Cyphershield

Cyphershield

Cyphershield is a blockchain security and smart contract audit company with experienced professionals with a passion for surgical scrutiny.

HighGround

HighGround

HighGround offer a Cyber Security Solution for everybody, regardless of skillset, to feel empowered in their security experience in reaching Cyber Resilience.