85% of COVID-19 tracking apps leak data

71% of healthcare and medical apps have at least one serious vulnerability that could lead to a breach of medical data, according to Intertrust. The report investigated 100 publicly available global mobile healthcare apps across a range of categories—i… Continue reading 85% of COVID-19 tracking apps leak data

A Recipe for Reducing Medical Device Internet of Things Risk

You may recall this blog post from March 2020. It highlighted the importance of factoring in clinical, organizational, financial and regulatory impact when determining which medical Internet-of-Things (IoMT) security vulnerabilities should be fixed first. Consider this post a part two. Whereas the previous post focused on the fact that IoMT devices are here to stay […]

The post A Recipe for Reducing Medical Device Internet of Things Risk appeared first on Security Intelligence.

Continue reading A Recipe for Reducing Medical Device Internet of Things Risk

Biomedical orgs working on COVID-19 vaccines open to cyber attacks

In a recently released report by the UK National Cyber Security Centre (NCSC), whose findings have been backed by Canada’s Communications Security Establishment (CSE) and the US NSA and CISA (Cybersecurity and Infrastructure Security Agency), the agenc… Continue reading Biomedical orgs working on COVID-19 vaccines open to cyber attacks

Take a Bite Out of Sweyn

If you work in the healthcare industry, you may have heard about a family of vulnerabilities called “SweynTooth.” But how serious is SweynTooth, and what should hospitals be doing to minimize risk?

The post Take a Bite Out of Sweyn appeared first on Security Intelligence.

Continue reading Take a Bite Out of Sweyn

Safeguarding Healthcare for the Future With Zero Trust Security

A Zero Trust security model can help healthcare organizations provision access in a more effective manner by focusing on data, workloads and identity.

The post Safeguarding Healthcare for the Future With Zero Trust Security appeared first on Security Intelligence.

Continue reading Safeguarding Healthcare for the Future With Zero Trust Security

Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT

The combination of digital transformation and the “Internet of Everything” is reshaping the modern landscape of OT, IoT and IoMT, meaning threat management must evolve in response.

The post Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT appeared first on Security Intelligence.

Continue reading Modernizing Threat Management for the Evolving Attack Surfaces of OT, IoT and IoMT

Measuring Security Risk in a Medical IoT World

To reduce cybersecurity risk, silos among internet of things (IoT) technologies and hospital teams should be broken down and impact across four pillars should be weighed.

The post Measuring Security Risk in a Medical IoT World appeared first on Security Intelligence.

Continue reading Measuring Security Risk in a Medical IoT World

Sensitive plastic surgery images exposed online

Researchers at VPN advisory company vpnMentor have found yet another online data exposure caused by a misconfigured cloud database. Continue reading Sensitive plastic surgery images exposed online

The challenges of cyber research and vulnerability disclosure for connected healthcare devices

As Head of Research at CyberMDX, Elad Luz gathers and analyzes information on a variety of connected healthcare devices in order to improve the techniques used to protect them and/or report about their security issues to vendors. The research includes … Continue reading The challenges of cyber research and vulnerability disclosure for connected healthcare devices