BayMark Health Services, North America's largest provider of substance use disorder (SUD) treatment and recovery services, is notifying an undisclosed…
SaaS technology and artificial intelligence (AI) are revolutionizing patient care, drug development, and health and wellness practices. Today, AI processes…
The changes to the healthcare privacy regulation with technical controls such as network segmentation, multi-factor authentication, and encryption. The changes…
In the ever-evolving landscape of cryptography, traditional encryption methods safeguarding data at rest and in transit remain foundational to cybersecurity…
Largest US addiction treatment provider notifies patients of data breach
BayMark Health Services, North America's largest provider of substance use disorder (SUD) treatment and recovery services, is notifying an undisclosed…
Navigating the Security Risks and Efficiency Gains of GenAI in Healthcare
SaaS technology and artificial intelligence (AI) are revolutionizing patient care, drug development, and health and wellness practices. Today, AI processes…
New HIPAA Cybersecurity Rules Pull No Punches
Healthcare organizations of all shapes and sizes will be held to a stricter standard of cybersecurity starting in 2025 with…
Proposed HIPAA Amendments Will Close Healthcare Security Gaps
The changes to the healthcare privacy regulation with technical controls such as network segmentation, multi-factor authentication, and encryption. The changes…
Massive healthcare breaches prompt US cybersecurity rules overhaul
The U.S. Department of Health and Human Services (HHS) has proposed updates to the Health Insurance Portability and Accountability Act…
The Traditional Advocates of the Security Perimeter Don’t Want You to Know about Data-Centric Security
In an era defined by continuous media announcements of organizations that have suffered both government and private data breaches and…
Best Practices for Effective Privileged Access Management (PAM)
Privileged accounts are highly coveted targets for malicious attackers due to the extensive access they provide. According to the 2024…
The Urgent Need for Data Minimization Standards
A central principle in many data protection laws around the globe is data minimization. But we are currently facing a…
Beyond Encryption: Advancing Data-in-Use Protection
In the ever-evolving landscape of cryptography, traditional encryption methods safeguarding data at rest and in transit remain foundational to cybersecurity…
BYTE BY BYTE
In an era where digital transformation is reshaping healthcare, dental practices find themselves caught in a perfect storm of cybersecurity…