healthcare
![DevOps](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093217/DevOps-400x200.jpg)
73% of healthcare organizations have now adopted DevOps
The last year was challenging for every business sector, and none more than healthcare which was under enormous pressure to provide care while changing the way many services …
![Alert](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101242/alert-pills-400x200.jpg)
92% of pharmaceutical companies have at least one exposed database
Reposify released its Pharmaceutical Industry Attack Surface Exposures Report examining the security posture of the world’s leading pharmaceutical companies. The report …
![Swisslog Healthcare's Translogic pneumatic tube system](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/02120534/swisslog_-healthcare_translogic-1000-400x200.jpg)
Critical vulnerabilities may allow attackers to compromise hospitals’ pneumatic tube system
Armis researchers have unearthed critical vulnerabilities in Swisslog Healthcare’s Translogic pneumatic tube system, which plays a crucial role in patient care in more …
![Healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2020/11/17123146/healthcare-attack-heart-400x200.jpg)
Curious to see how healthcare cybersecurity fared this year?
Most hospitals critically lack the ability to secure their supply chain systems, according to CynergisTek. In a new report, CynergisTek reviewed just under 100 assessments of …
![market](https://img.helpnetsecurity.com/wp-content/uploads/2021/07/13153041/business-market-2021-400x200.jpg)
CSaaS market to reach valuation of $87.59 billion by 2025
The threat quotient over the internet has increased phenomenally over the years. According to a survey by Risk Based, data breaches exposed nearly 4.1 bn records only in the …
![medical](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094451/medical-400x200.jpg)
How to strike the balance between privacy and personalization in healthcare and beyond
The trade-off between widespread technology adoption and responsible use often lies on the spectrum of privacy. When it comes to technologies fueled by data, such as …
![DNS](https://img.helpnetsecurity.com/wp-content/uploads/2021/01/19131052/dns-world-400x200.jpg)
Healthcare suffering from DNS attacks more than other industries
The healthcare industry experienced devastating effects from DNS attacks during the COVID-19 pandemic, more so than other industries, a report from EfficientIP and IDC shows. …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101017/healthcare-1-400x200.jpg)
Ensuring HIPAA compliance when using the cloud
Accelerated by the pandemic, health IT has continued to innovate at pace, while having to balance data protection and regulatory rules. However, critical transformations – …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101057/healthcare-400x200.jpg)
Health insurers facing growing risk of customer data theft
The U.S. health insurance industry is facing growing risks from cybersecurity threats due to the increasingly sophisticated techniques used by cybercriminals amid the …
![target](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103023/target-400x200.jpg)
IT, healthcare and manufacturing top targets for cyberattacks
Avanan announced the release of a report which analyzes today’s threat landscape, phishing vectors, and industry-based attacks, exposing healthcare and manufacturing as two of …
![bulb](https://img.helpnetsecurity.com/wp-content/uploads/2017/10/09102734/bulb-400x200.jpg)
Three security lessons from a year of crisis
Crime thrives in a crisis, and the coronavirus was the largest collective emergency that the world has faced for decades. While there are more heroes than villains in the …
![fix](https://img.helpnetsecurity.com/wp-content/uploads/2019/10/09092940/aid1-400x200.jpg)
How health tech can secure patient data post-CURES Act
It’s the central conundrum at the heart of telehealth: How can patients gain access to their most vital medical records without putting privacy at risk? The question is not …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD