Skip to main content

Network Infrastructure

Photo of Rockhampton Hospital in Central Queensland
By Adam Ang | 08:30 pm | June 10, 2025
The new telesurgery service in Central Queensland will also accelerate the training and upskilling of surgical residents and trainees. 
Nurse calls for a patient in a waiting room
By Andrea Fox | 09:42 am | June 10, 2025
Small providers struggle for survival, and security risks only exacerbate the challenge. But by sharing technologies and making use of resources like virtual CISOs, some hospitals are staying ahead of their biggest closure risks.
Philip Bradley, HIMSS_Las Vegas skyline Photo by halbergman/E+/Getty Images
By HIMSS TV | 05:06 pm | May 30, 2025
The adoption model's requirements help ensure that health systems' infrastructure is optimized to support advanced cybersecurity and analytics capabilities, says HIMSS digital health strategist Philip Bradley.
Abhinav Shashank, Innovaccer_Las Vegas skyline Photo by halbergman/E+/Getty Images
By HIMSS TV | 11:01 am | May 30, 2025
Abhinav Shashank, Innovaccer cofounder and CEO, says his company can help providers and payers connect data into a single layer that can support population health initiatives, revenue cycle automation and other big projects.
Katie Moussouris, Luta Security_Cybersecurity concept Photo by HAKINMHAN/iStock/Getty Images Plus
By HIMSS TV | 10:35 am | May 19, 2025
Katie Moussouris, Luta Security's CEO and founder, shares insights on national infrastructure security and the state of cyberdefense, advising healthcare organizations of all sizes to ensure that they have a full understanding of all their assets.
Dr. Ajlan Al Zaki, Burjeel Hospital_Dubai skyline Photo by SHansche/iStock/Getty Images Plus
By HIMSS TV | 10:08 am | May 16, 2025
Dr. Ajlan Al Zaki of Abu Dhabi's Burjeel Hospital says the UAE can build an ecosystem for advanced cancer care by decentralizing cell therapy production and training healthcare workers locally.
privileged access model schematic
Cybersecurity In Focus
By Andrea Fox | 01:00 pm | May 01, 2025
Healthcare organizations can stave off ransomware attacks with highly gated permissions that lock out common intrusions, say Intermountain cybersecurity leaders, who have found success with the approach.
A laboratory researcher using a digital tablet
By Adam Ang | 01:08 am | April 28, 2025
The research platform allows researchers to utilise data from 6.85 million patients.
Lock icon for cybersecurity
By Andrea Fox | 09:01 pm | April 24, 2025
IT teams need strong visibility into their networks – and the ability to respond fast to neutralize polymorphic threats that aim to steal credentials, intercept MFA authentication codes or deceive users into downloading malicious software.
Doctors in a remote online conference
By Adam Ang | 12:02 am | April 22, 2025
The government has recently disclosed its investment plan for physical infrastructure in healthcare.