Minimize Your Regulatory Risk with the HITECH Law Amendment: Safe Harbor Provision
Data breaches in healthcare are increasing at an alarming rate and must be considered inevitable, but you can limit your exposure to regulatory risk when one occurs.
Data breaches in healthcare are increasing at an alarming rate and must be considered inevitable, but you can limit your exposure to regulatory risk when one occurs.
The most recent Health IT vendor to settle with the government is a direct result of the DOJ’s new Civil Cyber-Fraud Initiative.
We use SAST tools during our tech due diligence engagements to provide independent analysis of security risk and to help provide recommendations.
As medical devices evolve to better treat and monitor patient health, cybersecurity remains a top priority. As per FDA guidance, “medical device security is a shared responsibility…”
Around the middle of August, a security research firm named Unit221B reached out to T-Mobile with some really, really bad news.
While workers may embrace the new normal of a hybrid workplace, certain employees may be less enthused than others. Chief among them: security teams.
With a technique called SIM-swapping, bad actors on the internet are having some of their greatest successes to date.
The biggest names in tech are experiencing increased scrutiny, restrictions (or the threat of restrictions), and more apprehension about security than ever before.