Access "Avi Rubin on what it takes to move healthcare IT security forward"
This article is part of the June 2014 Vol. 16 / No. 5 issue of Threat intelligence and risk: Why cybersecurity hangs in the balance
Stolen credit card credentials may have captured the headlines, but hackers are targeting medical information and device security on critical networks, says Avi Rubin, a professor of computer science at Johns Hopkins University. The technical director of the Johns Hopkins University Information Security Institute talks with Marcus Ranum about a range of healthcare IT security issues, including the healthcare industry's ongoing efforts to work with manufacturers to design secure systems. As a member of the Trustworthy Health and Wellness (THaW) research program, Dr. Rubin is spearheading healthcare IT security projects at Johns Hopkins in implantable medical devices, mobile health and network security. He is also a managing partner and founder of Harbor Labs, which provides consulting in high-tech litigation. Let's talk about computer security, medical devices and records! I know there's a lot of regulatory attention paid to aspects of this field, but I've always had the impression that it's a very different environment. There's a constant churn of high tech ... Access >>>
Premium Content for Free.
Threat intelligence versus risk: How much cybersecurity is enough?
by Kathleen Richards, features editor
Learn how threat intelligence plays into global risk assessment as more security officers are tasked with damage control.
Command-and-control servers: The puppet masters that govern malware
by Adam Rice and James Ringold
Are there shadow networks within your enterprise? Stop malware by shutting down command-and-control communication channels.
- Threat intelligence versus risk: How much cybersecurity is enough? by Kathleen Richards, features editor
Cyberthreat intelligence is getting crowded
by David Strom, Contributor
As threat intelligence communities multiply, it may be time to revisit crowdsourcing security.
Beyond the Page: Global risk assessment
by Kathleen Richards
This Beyond the Page explores the latest advances in threat intelligence and related technology, including threat information sharing services, SIEM and endpoint security products.
- Cyberthreat intelligence is getting crowded by David Strom, Contributor
High alert on cyber risk and cybersecurity preparedness
by Kathleen Richards, features editor
Threat intelligence can shine a light on important security holes.
Avi Rubin on what it takes to move healthcare IT security forward
by Marcus J. Ranum, Contributor
Medical data is the next frontier, Avi Rubin tells Marcus Ranum, as Johns Hopkins University seeks to insulate medical information systems from hackers.
PCI economics: Are the information security requirements working?
by Pete Lindstrom, Contributor
How to evaluate whether PCI DSS is lowering credit card fraud and the risks associated with data breach disclosure.
- High alert on cyber risk and cybersecurity preparedness by Kathleen Richards, features editor
More Premium Content Accessible For Free
Strategies for a successful data protection program
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
Devices, data and how enterprise mobile management reconciles the two
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
Putting security on auto-pilot: What works, what doesn't
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...