News
Features & Blogs
Oct 29, 2014
blog

Security Risks Inherent in the Medical Device Lifecycle 1

We must consider the extra wrinkle in this health security story: the numerous medical devices that collect and store PHI. These devices often lack security controls because they were built before security became a consideration......More
Oct 20, 2014
blog

Effective Design Partnerships: Understanding the Manufacturer’s Profile and Objectives 2

In the most effective partnerships, the manufacturer and outside firm begin with research (see the second column in this series for why this is so). But by the time the partners reach the design phase, they need to be able to define more than just the product concept....More
Sep 22, 2014
blog

Protecting Sensitive Data in a Sensitive Industry 1

A breach of personal health information carries an emotional component quite unlike the breach of credit-card information. Credit cards can be cancelled and reissued, but personal health information can’t be voided after being compromised in a data breach....More

Sponsored Introduction Continue on to (or wait seconds) ×