Medical device security risks: 19 vulnerabilities called Ripple20 have been uncovered by researchers at JSOF.
This paper (January 2013) highlights drivers for the increasing adoption of eHealth, both in terms of technology advances and legislative incentives, including the use of biometr
This paper (June 2015) describes the development of a secure and efficient authentication and authorisation architecture for IoT-based healthcare, explaining how the solution surpasses the state of
Insights on cyber-attacks and data breaches from US-based health IT security professionals
A critical evaluation of digital health interventions, primarily available via mobile devices.
Protection of sensitive patient health information in the U.S. - Security Rule
This report (February 2019) investigates US healthcare systems, comparing micro trends between 2017 and 2018 with macro trends in 2019 and looking ahead to 2020.
A study on the IoT-based Wearable Sensor Devices and patient data security
This paper (March 2017) explores and examines ethical issues in digital health, such as the misuse of metadata for investigating and prosecuting doctors who act as whistle-blowers within the public
This paper (February 2018) modelled the level of exposure, security and organisational factors associated with healthcare data breaches.
The number of cyber-attacks around the world exploded in 2020: exploiting the Covid-19 pandemic as an opportunity for cybercriminals to take advantage of the shift in focus towards smart working and hospital staff transferred to the frontline.
14 October 2021
The paper 'Cyberthreats to Hospitals: Panacea, a Toolkit for Peopl
The 43rd Annual Internat
The paper 'Promoting Cybersecurity Culture Change in Healthcare' has been recently publi
A new PANACEA research paper has been published on supporting secure health information exchange as part of the Frontiers on Digital Health series - connected health: status and trends.
A one-day virtual event exploring the value of cyber training in the era of remote working, implications emerging from the evolving threat landscape and opportunities for customised training packages.