This Week Health

Interviews in Action

More
Browse by Topic
Cybersecurity
AI/Machine Learning
Clinician Burnout
Cybersecurity
Cyber Carriers are Parked off the Coast and They are Attacking Healthcare
Read to Episode
AI & Machine
Learning
Interview in Action Fall '23 - Pranay Kapadia, Co-Founder & CEO, Notable
Read to Episode
Clinician Burnout
Podcast by Topic
R25 - Podcasts Category Filter-2
  • All
  • Leadership (675)
  • Emerging Technology (502)
  • Security (311)
  • Patient Experience (298)
  • Interoperability (297)
  • Financial (289)
  • Analytics (182)
  • Telehealth (175)
  • Digital (164)
  • Clinician Burnout (160)
  • Legal & Regulatory (141)
  • AI (106)
  • Cloud (92)
In the News

How a cybersecurity researcher befriended, then doxed, the leader of LockBit ransomware gang

August 15, 2024

In a detailed exposé at Def Con, cybersecurity researcher Jon DiMaggio revealed his undercover efforts to infiltrate and unmask the notorious ransomware gang LockBit. Earlier this year, international law enforcement agencies had temporarily disrupted LockBit’s operations, seizing their dark web site. After the gang quickly rebounded, DiMaggio shared his two-year effort to unearth the identity of LockBit’s administrator, who he identified as Dmitry Khoroshev. Employing sockpuppet accounts and gaining the trust of LockBit’s leader, DiMaggio infiltrated the group’s operations. This culminated in a coordinated reveal by DiMaggio and the U.S. Department of Justice, putting a spotlight on Khoroshev and marking a significant milestone in cybercrime investigations. DiMaggio’s work emphasizes the risks and intricacies involved in cybercrime research and the potential consequences for those who infiltrate criminal networks.

How a cybersecurity researcher befriended, then doxed, the leader of LockBit ransomware gang TechCrunch

Read More

HHS Making Progress on Department-wide Alignment of Health IT Investments

August 15, 2024

In August 2024, Micky Tripathi and Lisa Molyneux provided an update on the U.S. Department of Health and Human Services (HHS) Health IT Alignment Policy, initially announced in 2022. The policy aims to establish departmental-wide standards to promote interoperability in health IT investments. The recent publication of a proposed rule in the Federal Register seeks to amend the HHS Acquisition Regulation (HHSAR), setting requirements for health IT contracts to align with these standards. Efforts by the Assistant Secretary for Technology Policy (ASTP) and other HHS entities have identified significant investments impacted by this policy and are providing technical support to ensure consistent implementation. Public comments on the proposed rule are open until October 8, 2024.

HHS Making Progress on Department-wide Alignment of Health IT Investments healthit.gov

Read More

NIST releases three encryption standards to prepare for future quantum attacks

August 15, 2024

The National Institute of Standards and Technology (NIST) has finalized and released three new encryption standards aimed at strengthening cryptographic defenses against potential cyber threats posed by quantum computers. These standards, which took about eight years to develop, are designed for general encryption and digital signatures, and address future risks where quantum computing could compromise current encryption methods. The standards utilize algorithms selected in a 2022 competition, including CRYSTALS-Kyber for encryption and CRYSTALS-Dilithium and Sphincs+ for digital signatures. Organizations are encouraged to begin integrating these standards promptly to safeguard long-term data security against future quantum threats. Further draft standards and evaluations for additional algorithms are also underway.

NIST releases three encryption standards to prepare for future quantum attacks fedscoop

Read More

The best defense against insider threats – culture

August 15, 2024

Cybersecurity threats from external actors like Russia, China, North Korea, and Iran are significant, but insider threats, which involve individuals within the organization or third-party partners with authorized access, require equal attention. While tools such as Data Loss Prevention and email sanitization, alongside AI innovations, are valuable, the most crucial defense against insider threats is cultivating a positive organizational culture. Insider threats can be intentional, driven by motives like personal vendetta or financial gain, or unintentional, often stemming from employee negligence. A strong security culture, supported by leadership setting positive examples, transparent communication, team-oriented approaches, and clear policies, can empower employees to take ownership of their role in protecting the organization. Emphasizing ethical behavior and a collective mission fosters a resilient defense against insider threats.

The best defense against insider threats – culture paulconnelly

Read More
View All
Insights by Kate Gamble
View All
Our Partners

Premier

Diamond Partners

Platinum Partners

Silver Partners

This Week Health
Healthcare Transformation Powered by Community
Looking to connect or attend events? Visit our sister organization, 229 Project
Click here.

© Copyright 2024 Health Lyrics All rights reserved