Healthcare Information Security

Artificial Intelligence in Healthcare

More Articles

Protenus, RADAR Partner to Mitigate Healthcare Cybersecurity Risks

by Jessica Davis

Protenus, a health compliance analytics platform announced it’s partnering with RADAR, an incident response management software vendor on a new tool that leverages automation, predictive analytics, and artificial intelligence to...

Where Does AI Automation Fit Into Health Data Security?

by Jessica Davis

The 2017 Health Care Industry Cybersecurity Task Force report painted a damning picture of cybersecurity in healthcare, including the discovery that three out of four hospitals operate without a designated security leader. Those providers...

Few Execs Believe Healthcare IT Security Tech Will Be Disruptive

by Fred Donovan

Only 7 percent of executives surveyed by Reaction Data believe that healthcare IT security technology will have a significant disruptive impact on healthcare. Twenty-nine percent said that telemedicine will be the biggest disruptor, 20...

Patient Privacy Impact of Technology Worries Healthcare Leaders

by Fred Donovan

Healthcare leaders are concerned about patient privacy issues when it comes to undertaking a technology adoption initiative, according to a survey of 347 US health physicians and executives by Ernst & Young. Other worries about...

AI Can Bolster or Undermine Healthcare Data Security, Panel Says

by Fred Donovan

Artificial intelligence (AI) can be used to improve healthcare data security, but it can also undermine healthcare data security, observed a panel at the World Medical Innovation Forum held in Boston April 23 to 25. The use and misuse of...

How AI Can Help Fight Healthcare Ransomware Threats

by Elizabeth Snell

Healthcare is facing more ransomware threats every day, and is a prime target for such attacks. However, the Institute for Critical Infrastructure Technology (ICIT) explained in a recent paper that artificial intelligence could greatly aid...

X

SIGN UP and gain free access to articles, white papers, webcasts and exclusive interviews on

HIPAA Compliance
BYOD
Cybersecurity
Data Breaches
Ransomware

Our privacy policy


no, thanks

Continue to site...