Cybersecurity attacks have increased the risk to patient data, with attackers targeting the physical layer such as hardware and firmware. Firmware is often exploited as its updates require a manual process that is frequently delayed by IT teams. To mitigate against this, it is essential to ask five questions of your hardware integrator about firmware authentication, hardening checks, inventory scans, traceability, and post-delivery support. The aim is to ensure robust controls that can protect against known attack vectors and expedite recovery.

Most AI privacy research looks the wrong way
Most research on LLM privacy has focused on the wrong problem, according to a new paper by researchers from Carnegie Mellon University and Northeastern University.