Search Results
The default setting for search results displays All Content. If you prefer to see recent content only, please adjust the date filter.
Filter your results:
Types
Topics
11 Results Found
The Critical Link Between Cost, Quality, and Outcomes (CQO) and Unique Device Identification (UDI) White Paper
White Papers
In an effort to capture broader insights on UDI adoption from across the health care field, AHRMM, with participation by the FDA, held LUC Data Quality Workshops during four conferences in 201
Getting Ready for Post-Quantum Cryptography
William Barker
Dakota Consulting
Gaithersburg, MD
William Polk
Applied Cybersecurity Division
Information Technology Laboratory
Preparing Supply Chain to Meet Meaningful Use
White Papers
This paper will define the regulation and explore how a supply chain department can support their organization in meeting this aspect of the regulations.
Implementing RFID in the Medical Device Supply Chain: The Journey at BJC HealthCare
White Papers
The lack of end-to-end supply chain visibility in the medical device channel contributes to an estimated five billion dollars ($5B) of inventory waste for the U.S.
Concord Hospital Supply Chain Management’s Journey to ISO 9001 Certification
White Papers
This paper will share Concord Hospital’s journey to ISO 9001 certification, define the quality management system (QMS), the six key policies of the QMS and outline the key components of each of tho
Theft of Intellectual Property: Threats to Medical Research and Innovation
In this members-only white paper by the AHA Center for Health Innovation, John Riggi, senior adviser for cybersecurity and risk at the AHA, and Edward You, supervisory special agent for weapons of mass destruction at the FBI, outline growing concern among the FBI, Congress and some health care leaders about the theft of U.S. medical research intellectual property by foreign governments. Recently the Senate Finance Committee held a hearing on foreign threats to taxpayer-funded research.
FBI Alert: TPL White: Increased Number of Emotet Command and Control IP Addresses Identified
In early June 2019, Emotet, an advanced modular banking Trojan, attempted to communicate with 214 command and control (C2) IP addresses for initial instructions, indicating cyber actors recently made modifications or updates to Emotet malware or infrastructure. Immediately following, the Emotet malware ceased communication with the previously known C2 IP addresses.
DejaBlue-High Risk Windows Vulnerability Whitepaper
As a follow-up to our June 6, 2019 white paper on BlueKeep, this report documents a recent alert from Microsoft concerning two similar remote desktop protocol (RDP) vulnerabilities, entitled BlueKeep 2 and BlueKeep 3, together dubbed “DejaBlue.”
Health Care Investment Trends: A GE Ventures Perspective
White Papers
By Lee Ann Jarousse, Senior Editor, H&HN