BUSINESS > Services > Health & Welfare


« Back to News

2017-07-13

AI For Effective Healthcare Cyber Resilience

Healthcare CISOs should recognise that AI has the ability to enhance the identification of malicious activity and to protect systems and data from attackers.

2017-07-07

Is It Really Possible to Protect Your Health Data?

It is possible to protect health data, but only if governments, healthcare providers & individuals see it as a top priority. Opinion by Sandra O'Hare.

2017-07-03

Hacking A Chip With A Wave of Your Hand

Electro-magnetic fault injection hacking works and soon it will become important to protect electronic device components from non-invasive hacks.

2017-07-03

Urgent: Investment In NHS Cybersecurity

The Health Service in Scotland needs urgent investment to update legacy systems & preparedness.

2017-06-27

NHS Cyberattack Was 'launched from N. Korea'

The UK's NCSC confirm the view that the Wannacry attack which badly affected the National Health Service was perpetrated by N. Korea.

2017-06-16

Healthcare Sector Accounts For 43% Of UK Data Breaches

UK Information Commissioner data shows that healthcare organisations were consistently top of the list for data breach incidents 2014 - 2016.

2017-06-13

How Cybercrime Affects The Healthcare Industry

Stolen medical records can be used for different types of identity fraud and phishing attack. The threat from these can persist for many years.

2017-06-05

The Internet of Things Will Be Even More Vulnerable to Cyber Attacks

As more smart devices become connected, the world will become more exposed to attacks like the one that hit UK’s NHS. Opinion By Hannah Bryce

2017-05-23

What Healthcare CISOs Should Know

Protected health information (PHI) is more lucrative on the dark web than other form of personally identifiable information.

2017-04-03

DeepMind Uses Blockchain To Track Health Data

Verifiable Data Audit: DeepMind Health will work with the NHS to track patient personal data in real-time.

Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

eBook: Practical Guide to Security in the AWS Cloud

eBook: Practical Guide to Security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

WEBINAR: How To Build A Security Observability Strategy In AWS

WEBINAR: How To Build A Security Observability Strategy In AWS

Thursday, Apr 22, 2021 - Join this webinar to learn how to build a security observability strategy in AWS, covering cloud-native monitoring sources, guardrails, and automation capabilities.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Indelible Data

Indelible Data

Indelible Data is an established information security and technology consultancy and a Cyber Essentials Certification Body.

Alipay

Alipay

Alipay.com is a third-party online payment platform and a leader in online payments with 400 million users.

Station X

Station X

Station X specialise in utilising cutting-edge technology, extensive knowledge and experience, to help clients identify vulnerabilities and reduce business risk from cyber security attacks.

Parsons

Parsons

Parsons has developed a converged security offering that combines cybersecurity, integrated network solutions, and critical infrastructure protection.

Prevalent

Prevalent

Prevalent provides the only unified platform for Third Party Risk Management and the first vendor evidence sharing portal that enables collaboration between both enterprises and vendors.

Veristor

Veristor

Veristor are seasoned experts in IT technology, providing a full suite of design, deployment, support, and managed service offerings.

Brookcourt Solutions

Brookcourt Solutions

Brookcourt Solutions delivers cyber security, network monitoring technologies and managed security services to help secure and protect your organisation’s critical infrastructure.

Porto Research, Technology & Innovation Center (PORTIC)

Porto Research, Technology & Innovation Center (PORTIC)

PORTIC brings together several research centers and groups from P.PORTO in a single space, forming a superstructure dedicated to research, technology transfer, innovation and entrepreneurship.