The National Security Agency gave Unisys Stealth the National Information Assurance Partnership certification, which means the company has met the standards of more than 20 countries to protect secure information and systems. […]

Telehealth, the delivery of health care services while the patient is at one site, and the licensed health provider is at another site, is here. But what does the future hold in terms of cost, coverage, consumer demands, and legislation? MeriTalk takes an in-depth look at those challenges, and talks with industry leaders.






[…]

Health care wearables are gradually becoming an integral component of patient care, with an influence on remote patient monitoring, wellness program development, treatment of chronic disease, and more.






[…]

The Department of Health and Human Services announced two cooperative agreement funding opportunities for an Information Sharing and Analysis Organization for the health care and public health sector. The goal of the ISAO is to use information sharing as a means to strengthen response to health-related cyber threats.






[…]

The Democratic National Convention, which meets in Philadelphia this week to nominate the party’s presidential candidate, released its party platform that deals with technology issues including broadband, open Internet, privacy, education, and cybersecurity.






[…]

Campaign managers who urge politicians that they have a certain state’s unwavering support can now use data analytics to detect cities and even individuals within those states who may not back the candidates.






[…]

The Republican Party platform, released during the convention in Cleveland that chose Donald Trump as the nominee, explains the party’s views on technology including broadband expansion, net neutrality, cybersecurity, education, and health care.






[…]

The U.S. Department of Homeland Security and the General Services Administration hosted an industry day to address companies’ questions regarding DHS’s Request for Information regarding mobile threats and defenses.






[…]