Healthcare IT Security

April 7, 2006

Health privacy

Filed under: Health Informatics, Medical Informatics, Privacy — healthcaresecurityguy @ 6:26 am

An interesting article about health privacy titled Protect Your Health Privacy


April 6, 2006

Do you DReaM open source DRM ?

Filed under: Uncategorized — healthcaresecurityguy @ 12:35 am

Then its not just a DReaM its from Sun though. Like many nice things that have come out of Sun in the past, this too could be interesting. DRM should always be treaded upon carefully but it could provide newer models of assurance of operations done on data.

March 31, 2006

Analysis of the Linux Random Number Generator

Filed under: Cryptography, Open-Source, Security — healthcaresecurityguy @ 11:49 am

An interesting analysis of random number generator. Good to know what you get in linux…I am wondering if there exists a similiar one that exists for Windows and other operating systems. The bottom line in the paper is the fact that when /dev/random was thought of they were not thinking about security 🙂

March 23, 2006

Sneak preview into future….

Filed under: Uncategorized — healthcaresecurityguy @ 4:16 am

After a longwhile I got a mail from an aquintance of mine Mike Rosing, he works on very interesting stuff. He is currently working on a platform technology that enables the transfer of information from machines to humans via the tongue at Brainport Techologies. I am wondering when we would be able to have an interface to our sensory cortex….mm..does that remind you of the movie matrix…

March 17, 2006

Open Source vs. Commercial Software in healthcare

Filed under: Health Informatics, Medical Informatics, Security — healthcaresecurityguy @ 12:29 am

I had posted my thoughts on open vs commercial software in healthcare. I found an interesting post in Healthblog,you could guess, where the blog is from. Interestingly enough there is reference to security of Vista EMR ( look who is talking ). Assuming that level of security provided remains at current levels, I would be suprised if there are no serious implications to privacy and security if a transition to so called commercial OS and applications.

March 16, 2006

How about computer viruses infecting you ?

Filed under: Health Informatics, Medical Informatics, Security — healthcaresecurityguy @ 3:40 pm

An interesting post on slashdot set me thinking. RFID’s are used in medical procedures, what would that mean, computer viruses infecting humans ( with RFID’s). The acceptance of RFID’s has raised few eyebrows regarding privacy more interesting events may be on the horizon

March 7, 2006

Accidental auctions of medical records ….

Filed under: Medical Informatics, Security — healthcaresecurityguy @ 6:55 pm

Another incident of sensitive medical health records being revealed apparenlty from a report that apppeared in canadian press “A man who purchased 41 tapes from the B.C. government found himself the unexpected owner of 77,000 personal medical files.” The solution possibly lies in trusted computing .

March 6, 2006

Thoughts on “Best language for secure healthcare applications”

Filed under: Health Informatics, Security — healthcaresecurityguy @ 6:41 pm

The post on Shahid’s blog on choice of language for secure applications, has generate a few responses. This reminds me of excerpts from an interview of John Veiga. The future i beleive is going to head towards the trusted computing side of things. So the real choice would be what  models offered in trusted computing does these languages support,  read  proprietory  or closed.


Filed under: Cryptography, Security — healthcaresecurityguy @ 6:15 pm

NIST has been inviting submissions for replacement of SHA1. Interesting submission, with provable properties applying tricks more common in the assymetric crypto world. There is a second workshop being organised the dead line for submission is May 12. Looking forward to its outcome and its implication on legacy systems.

March 1, 2006

Experts Say It’s Time to Write Secure Code

Filed under: Security — healthcaresecurityguy @ 5:04 am

An interesting article on eweek about Gary McGraw and secure coding. Gary has produced some very good books, these include Exploiting Software: How to Break Code, Rootkits and Building Secure Software: How to Avoid Security Problems the Right Way. The latest in the series is titled Software security: building security in , its on OReilly safari. It has all the hall marks of Gary book.

« Newer PostsOlder Posts »

Blog at