What would you do if one of your third-party vendors compromised your patients’ health information? Not your problem, right? Wrong. Even though the third party potentially...
The number of devices connected to a single hospital network is overwhelming. For example, a typical hospital has 10 pieces of biomedical equipment for every licensed...
Typical penetration testing consists of low-level hackers attacking a system with a list of known vulnerabilities, and defenders preventing those hacks using an equally...
From getting how far germs can travel through the air to knowing how much bacteria is on the average desktop, take our quiz to test your germ IQ. Plus, see how Staples...
The Essentials of Information Security brings together the latest in information, coverage of important developments, and expert commentary to help with your Information...
The Essentials for CTOs – 2019 Kit, brings together the latest information, coverage of important developments, and expert commentary to help with your CTO related...