Skip to main content

Privacy & Security

By Andrea Fox | 11:29 am | October 09, 2025
Three reports released this week show that supply chain cyberattacks were the most likely to disrupt care delivery, with cloud account compromises emerging as the most prevalent threat to healthcare organizations.
By Adam Ang | 02:53 am | October 09, 2025
The CSIRO has identified three critical priorities for responsible AI use in Aboriginal and Torres Strait Islander healthcare.
Cybersecurity In Focus
By Andrea Fox | 02:29 pm | October 07, 2025
Peer-to-peer threat intelligence is enormously important as cyberattacks continue to target the industry, says Health-ISAC's chief security officer, even as a key information sharing act, CISA 2015, has now expired.
By HIMSS TV | 10:07 am | October 06, 2025
Data management basics are too often lacking, and policy regs still evolving, says cybersecurity strategist Richard Staynings. Whether dealing with automated decision support or adversarial deepfakes, healthcare orgs need both.
SPONSORED
By Trend Micro | 01:11 pm | September 30, 2025
Best practices for safeguarding your healthcare AI workloads and PHI.
By Andrea Fox | 09:43 am | September 30, 2025
Its latest interoperability projects explore privacy-preserving applications that could improve the accuracy and scalability of individual access services under TEFCA and test FHIR-based capabilities.
By Adam Ang | 02:48 am | September 30, 2025
The report also notes that more than half of clinical and IT leaders are not confident that shared devices fully protect patient data.
By HIMSS TV | 09:16 am | September 19, 2025
Pelu Tran, Ferrum Health's CEO, says a point solution approach for scaling health AI "doesn't really work when you're dealing with every possible disease, patient or service line" needing AI, and favoring one LLM may also limit future coding.
By Andrea Fox | 09:53 am | September 17, 2025
The NOFO encourages states to facilitate collaboration between rural health facilities and larger regional systems to share resources, technology and services for their applications. 
By Jeff Lagasse | 10:35 am | September 16, 2025
Threat actors used a number of methods to gain access to Salesforce, a CRM app commonly used by hospitals and health systems.