?? Great discussions at HIMSS Cybersecurity Forum! ?? If you caught Richard Staynings, Cylera’s Chief Security Strategist, at his Monday Fireside Chat: Why You Should Care That the Web Browser is Ubiquitous in Healthcare, you know how critical securing web-based applications has become in modern healthcare. Let’s keep the conversation going! Our team—Richard Staynings, Jayson Repko our US Director of Sales & Partnerships, and Jason Chambers, our VP of Engineering—will be walking the floor and available to connect. ?? Want to chat? Drop us a message or schedule a meeting: https://hubs.la/Q039tSNq0 See you at #HIMSS25! ?? #HIMSS #HealthcareCybersecurity #IoTSecurity #CyberResilience #MedicalDeviceSecurity
Cylera
计算机和网络安全
New York,NY 4,440 位关注者
Easy, accurate, and extensible Healthcare IoT intelligence and security
关于我们
Cylera provides the easiest, most accurate and extensible, platform for healthcare IoT asset intelligence and security to optimize care delivery, service availability and cyber defenses across diverse connected medical device and infrastructure. The platform accurately discovers, categorizes, assesses and monitors known and unknown IoMT assets with high fidelity to deliver unparalleled asset inventory, usage telemetry, threat prioritization, analytics, and guided remediation. The SaaS solution offers rapid implementation and works with popular IT and healthcare systems to help organizations advance cyber program maturity, increase operational efficiency, mitigate cyber risk, and enable compliance audit-readiness.
- 网站
-
https://www.cylera.com
Cylera 的外部链接
- 所属行业
- 计算机和网络安全
- 规模
- 11-50 人
- 总部
- New York,NY
- 类型
- 私人持股
- 创立
- 2017
地点
Cylera 员工
-
Caleb Barlow
CEO | Board Member | Investor | Innovator | Incident Responder | Team Builder | Mentor | CISO |
-
Richard Staynings
Keynote Speaker, Cybersecurity Luminary, Evangelist, Thought Leader, Advocate, and Board Member
-
Chad Waters
-
Tomás Maldonado
Tomás Maldonado是领英影响力人物 Chief Information Security Officer @ NFL | Technology Executive | Board Advisor | Investor
动态
-
?? Attackers Are Exploiting a New Driver Vulnerability Cybercriminals are weaponizing a newly discovered driver vulnerability (CVE-2025-0289) in Paragon Partition Manager’s BioNTdrv.sys, using it to escalate privileges and deploy ransomware. This attack is part of a growing trend known as Bring Your Own Vulnerable Driver (BYOVD), where attackers introduce a trusted but exploitable driver to bypass security defenses, disable endpoint protection, and take full control of a system. ??Why does this matter for healthcare cybersecurity? ?? ?? Privilege Escalation – Once executed, hackers gain SYSTEM-level access, potentially compromising patient data, imaging systems, and connected medical devices. ?? Healthcare IoT Exposure – Many unpatched medical devices still rely on outdated drivers, increasing the risk of exploitation. ???? The good news? Microsoft has added the vulnerable driver to its blocklist, and Paragon has released version 2.0.0 to patch the issue. But healthcare organizations must take proactive steps to secure their environments. ?? Read the full article here:https://hubs.la/Q0393HZS0 ?? Want to stay ahead of the latest IoT healthcare security threats like this? Join our weekly newsletter: https://hubs.la/Q0393J3l0 #HealthcareCybersecurity #CyberThreats #IoTSecurity #Ransomware #ThreatIntelligence
-
?? Healthcare Cyberattacks Are Hitting Harder—Is Your Organization Prepared? Ransomware shutting down critical services. 1M+ patient records exposed. A military healthcare provider fined $11M for cybersecurity failures. Cyber threats are evolving fast, and healthcare security leaders must stay ahead. ?? Read the latest insights for more info & subscribe now ?? #CyberSecurity #HealthcareSecurity #CISO #HIPAA #Ransomware #DataProtection #CyberThreats #HealthcareIT #MedicalDeviceSecurity
-
?? Cyber Threats Are Disrupting UK Healthcare – What Security Leaders Need to Know Cyberattacks on NHS and private healthcare providers are escalating—delayed cancer treatments, multi-million-pound ransomware demands, and emerging attack tactics are putting patient care at risk. ?? Read the latest insights & subscribe now ?? #CyberSecurity #HealthcareSecurity #NHS #CISO #Ransomware #DataProtection #CyberThreats #HealthcareIT #MedicalDeviceSecurity
-
? Last Chance! IoT Risk Webinar Tomorrow at 10 AM Eastern Hospitals can’t afford to ignore IoT security risks. ?? Tomorrow, our experts will reveal: ? The #1 mistake hospitals make with IoT vulnerabilities ? How to prioritize and mitigate risks before an attack ? Insights that protect patient care AND your budget Register before seats fill up! https://hubs.la/Q038fWBg0 #IoTWebinar #Cybersecurity #HealthcareIT #RiskManagement
-
-
Cyberattacks on UK hospitals and NHS Trusts are surging, yet many still rely on outdated compliance practices that fail to protect against modern threats.?? ?? 74% increase in healthcare cyberattacks across the UK. ?? As much as £17M in breach fines. ?? 68% of UK-based healthcare organizations faced IoT-focused attacks. The Problem? NHS hospitals are still relying on manual compliance tracking and reactive security, leaving them exposed. ?? What’s missing? ? Real-time attack visibility – Traditional methods often fail to identify breaches promptly, allowing attackers to remain undetected for extended periods and move laterally. ? Automated risk tracking – Static compliance checklists do not adapt to evolving threats, leaving systems exposed. ? IoT-Specific Security Protocols - Connected medical devices frequently lack robust security measures, making them prime targets for cybercriminals. ?? To combat these challenges, UK healthcare organizations must modernize their compliance and security strategies. Implementing real-time monitoring, automating risk assessments, and establishing IoT-specific security protocols are critical steps toward safeguarding patient data and maintaining trust in healthcare services. ?? See how automated compliance tracking strengthens NHS cybersecurity: https://hubs.la/Q037hycj0
-
-
Most hospitals think they have IoT security under control—until they get breached. ??More than 50% of connected medical devices and healthcare IoT devices have at least one unpatched critical vulnerability. ?? Outdated, unmanaged devices create entry points for ransomware and cyber threats. The worst part? Most hospitals don’t discover breaches for months. On February 26 ??, our healthcare security experts will reveal: ? The #1 mistake hospitals make with IoT vulnerabilities ? How to prioritize security risks before an attack happens ? Lessons from real-world cyber incidents ?? Spots are filling up fast—secure yours now! https://hubs.la/Q037hvXp0 #IoTSecurityWebinar #IoTCybersecurity #RiskManagement #HealthcareIoT #CISO
-
-
Cyber threats are evolving—is your security strategy keeping up? ?? The biggest IoT risk hospitals face: 1?? Unpatched medical devices—A hacker’s easiest way in. 2?? Vendor-managed risks—Are your third-party partners secure? 3?? Incident response delays—Most breaches aren’t discovered until months later. 4?? Lack of real-time visibility – Unknown devices = unknown risks. Which is the biggest challenge for your team? Drop your answer below! ?? #IoTChallenges #CyberRisk #HealthcareCybersecurity #CISOStrategy?
此处无法显示此内容
在领英 APP 中访问此内容等
-
?? Phobos Ransomware Takedown ?? Authorities have taken down a major Phobos ransomware operation, arresting Russian nationals linked to attacks on hospitals, municipalities, and critical infrastructure. ?? Phobos has been a persistent threat, known for targeting healthcare organizations with double extortion tactics—stealing data before deploying ransomware to cripple operations. Even when ransom wasn’t paid, patient care and critical services were disrupted. Read the full story: https://hubs.la/Q036_HW20 #Ransomware #CyberThreats #HealthcareIoTSecurity
-
?? Ransomware Stopped—But the Breach Still Happened ?? Tampa General Hospital - one of Florida's largest hospitals successfully repelled a ransomware attack before the attackers could encrypt systems. ???? But the damage was already done. ??The attackers, identified as the Snatch ransomware group, had already exfiltrated the personal information of approximately 1.2 million patients. ?? This is the modern ransomware playbook. Even when hospitals stop the ransom attempt, attackers still walk away with stolen data—fueling extortion, identity theft, and long-term security risks. ?? For healthcare, this is yet another wake-up call. Stopping encryption simply isn’t enough. The focus MUST be on preventing access in the first place. ?? Proactive defense is critical: ? Real-time threat detection to stop lateral movement ? Network segmentation to isolate critical systems ? Continuous risk monitoring to prevent vulnerabilities before attackers exploit them At Cylera, we help hospitals build this layered approach—because protecting data is just as important as keeping systems online. ?? Read the full story here: https://hubs.la/Q036LVYY0 ?? What measures has your organization implemented to protect against data exfiltration? Share your insights below. #HealthcareCybersecurity #Ransomware #DataBreach #PatientSafety #CyberThreats