BUSINESS > Services > Health & Welfare


« Back to News

2019-08-27

Psycho-Cyberchology

Organisations fighting against cybersecurity breaches have a new weapon: Cyberchology, psychometric tests to find safer personality types.

2019-07-25

Cannabis Buyers Are Uniquely Vulnerable To Cyber Attacks

N. America’s emerging cannabis industry, along with many of its customers, could be especially vulnerable to hackers and extortion.

2019-02-20

Obsessive Web Browsing Linked To Depression

A large-scale academic study discovers a link between spending a lot of time browsing the Internet and depressive symptoms.

2018-09-12

N. Korean Hacker Fingered For Wannacry Attacks

The US justice department has charged an alleged North Korean spy for helping to perpetrate cyber-attacks against the UK National Health Service.

2018-09-11

The App That Lets You Sell Your Personal Healthcare Data

Patients will be able sell their anonymised data to pharmaceutical companies, researchers and others while retaining greater control over privacy.

2018-09-07

Why Mainframe Security Risks Are Largely Unrecognized

Healthcare records are a top target for hackers, but what about vulnerabilities that aren’t even on the radar of hospital IT departments?

2018-08-17

Internet of Things For Healthcare

Healthcare providers and device makers are all looking to the IoT to revolutionise the gathering of healthcare data and the delivery of care itself.

2018-07-26

Healthcare Cyber-Attacks Still Going Up

Healthcare providers and government agencies across the US are scrambling to find adequate defense mechanisms against attackers.

2018-07-25

Singapore’s Giant Healthcare Hack

Hackers attacked the computers of SingHealth, the Republic's largest public healthcare group and scooped up personal information on 1.5m patients.

2018-07-02

Google AI To Predict Patient Healthcare Outcomes

Google has a tool that could forecast patient outcomes, how long they may stay in hospitals, odds of re-admission and chances they will die.

Perimeter 81

Directory of Suppliers

WEBINAR: How To Build A Security Observability Strategy In AWS

WEBINAR: How To Build A Security Observability Strategy In AWS

Thursday, Apr 22, 2021 - Join this webinar to learn how to build a security observability strategy in AWS, covering cloud-native monitoring sources, guardrails, and automation capabilities.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

VTT Technical Research Centre of Finland

VTT Technical Research Centre of Finland

VTT is the leading research and technology company in the Nordic countries. Areas of activity include cyber security.

Sudan CERT

Sudan CERT

Sudan CERT is the national Computer Emergency Response Team of Sudan.

Terranova Security

Terranova Security

Terranova is dedicated to providing information security awareness programs customized to your internal policies and procedures.

Coursera

Coursera

Coursera provides universal access to the world’s best education, partnering with top universities and organizations to offer courses online. Subject areas include Computer Security & Networks.

G Data

G Data

G DATA developed the world's first antivirus software, and we have remained pioneers in innovation for IT security ever since.

i-Sprint Innovations

i-Sprint Innovations

i-Sprint is a leader in Securing Identity and Transactions in the Cyber World for industries that are security sensitive.

CETIC

CETIC

CETIC is an applied research centre in the field of ICT. Key technologies include Big Data, Cloud Computing, the Internet of Things, software quality, and trust and security of IT systems.

Asia Center of Excellence for Smart Technologies (ACES)

Asia Center of Excellence for Smart Technologies (ACES)

ACES is a one-stop competency center and incubator for the development of Industry 4.0 and associated technologies including cybersecurity, robotics, IoT and Big Data.

Haven Group

Haven Group

Haven Group and its companies are a cyber security one-stop-shop for our clients offering a full range of cyber security services to our clients in a unified and united way.

Lionfish Cyber Security

Lionfish Cyber Security

Lionfish Cyber Evolution & Empowerment Model™ empowers SMBs to prepare and protect themselves against cyber threats using a unique combination of on-demand training, support and managed services.