Skip to content

Blog

All blogs

Blog

May 11, 2026

đź§© Featured workflows: See data orchestration in action

Explore our library of composable workflows built for common use cases across provider organizations, payers, and health tech. Built from modular building blocks, these end-to-end data flows are designed for true flexibility — allowing you to rearrange and customize components to fit your needs.

Blog

May 11, 2026

From static logs to workflows you can actually follow

As healthcare data integrations become more dynamic, composable, and conditional, the tools used to understand them need to evolve too. We’re introducing a modern workflow viewer that goes beyond static, text-based log outlines with a clear, interactive map of how data actually moves through your system.

Blog

Apr 23, 2026

From months to minutes: Building real-time clinical data pipelines with natural language

Build real-time clinical data pipelines in minutes using natural language. Learn how Databricks Zerobus and Redox eliminate integration bottlenecks and subsecond latency to power instant AI insights and EHR writeback.

Blog

Apr 21, 2026

The “time-to-wow” trap: Why vibe-coded AI fails in production

Why vibe-coded AI fails in production: beyond the “time-to-wow” demo trap. Discover why healthcare AI integrations need more than just foundational models. Learn how an agent harness and real-world EHR expertise bridge the gap between a polished prototype and production-ready interoperability.

Blog

Apr 21, 2026

The onramp survival guide: Navigating national networks and beyond

Joining a national network is a major expedition, and winging it is not a strategy that scales. Connection is just the starting line, but having the right partner determines if you actually reach the summit. Join VP of Customer Success Jenn Kavanaugh on the trek as she maps the route to achieving network success with intentionality and integrity.

Blog

Apr 6, 2026

Here’s what Redox is releasing in Q2 2026

Whether you’re a long-time partner or exploring Redox for the first time, this month-by-month breakdown highlights the tools we’re building to help you move from reactive troubleshooting to proactive orchestration in Q2 2026.

Blog

Mar 26, 2026

The Cyber Checkup – The Cracks in macOS

Think Macs are immune to malware? Think again. Security Engineer Zak Cowan breaks down a recent macOS campaign and explains why built-in protections like Gatekeeper aren’t enough to stop modern, behavior-based attacks.

Blog

Mar 25, 2026

Navigating the CMS ACCESS Model API Implementation Guide: Key takeaways and what to do next

Preparing for the CMS ACCESS Model launch on July 5, 2026? Learn key takeaways from the v0.9.1 API Implementation Guide, including FHIR R4 requirements and asynchronous polling hurdles.

Blog

Mar 18, 2026

The New AI Infrastructure: Solving for Inter Vs. Intra

Healthcare interoperability has a new mandate. Learn why AI success depends on intraoperability — the internal data infrastructure that turns fragmented systems into an agentic enterprise.

Blog

Mar 11, 2026

The Patch Plan – Enhancing Your Vulnerability Management Program

Building a vulnerability management program isn’t just about finding bugs; it’s about context and communication. In this episode of Shut the Backdoor, learn how staff security engineers Trevor Wilson and Ethan Wolkowicz prioritize risk, navigate cloud environments, and bridge the gap between security and engineering.

Blog

Mar 3, 2026

Upgraded Alert Rules: Greater control & visibility for more proactive monitoring

At Redox, we understand that effective data monitoring is crucial to keeping your healthcare integrations healthy and running smoothly. That’s why we’re excited to share ongoing improvements to our alert rules, giving you greater visibility and control to stay ahead of issues and act with confidence and speed.

Blog

Feb 27, 2026

The Cyber Checkup – Leadership Transitions

In this episode of The Cyber Checkup, we discuss how to navigate security leadership transitions without disrupting operations, covering documentation, shared access controls, escalation paths, and how to turn change into an opportunity to strengthen your security program.