Premium Content

Access "Avi Rubin on what it takes to move healthcare IT security forward"

Published: 02 Jun 2014

Stolen credit card credentials may have captured the headlines, but hackers are targeting medical information and device security on critical networks, says Avi Rubin, a professor of computer science at Johns Hopkins University. The technical director of the Johns Hopkins University Information Security Institute talks with Marcus Ranum about a range of healthcare IT security issues, including the healthcare industry's ongoing efforts to work with manufacturers to design secure systems. As a member of the Trustworthy Health and Wellness (THaW) research program, Dr. Rubin is spearheading healthcare IT security projects at Johns Hopkins in implantable medical devices, mobile health and network security. He is also a managing partner and founder of Harbor Labs, which provides consulting in high-tech litigation. Let's talk about computer security, medical devices and records! I know there's a lot of regulatory attention paid to aspects of this field, but I've always had the impression that it's a very different environment. There's a constant churn of high tech ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside


More Premium Content Accessible For Free

  • Strategies for a successful data protection program

    Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...

  • Devices, data and how enterprise mobile management reconciles the two

    The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...

  • Putting security on auto-pilot: What works, what doesn't

    For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...