Arrived early at Boston MEDevice MD&M event excited to discover what's in store over the next two days. Looking forward to hearing from thought leaders in the space and exploring what's on the horizon as we quickly approach 2025.
Medware Cyber
IT 服务与咨询
Boston,Massachusetts 146 位关注者
We don't just secure medical devices; we safeguard the intersection of innovation and patient safety.
关于我们
Medical Device Cybersecurity play a crucial role in the healthcare ecosystem. As the medical landscape becomes more interconnected and reliant on digital solutions, ensuring the security of these devices is paramount for patient safety and data protection. At Medware Cyber we specialize in ensuring security is maintained throughout the entire device lifecycle, from design and development to disposal.
- 网站
-
https://www.medwarecyber.com/
Medware Cyber的外部链接
- 所属行业
- IT 服务与咨询
- 规模
- 2-10 人
- 总部
- Boston,Massachusetts
- 类型
- 自有
- 创立
- 2023
- 领域
- Risk Assessment & Management、Device Penetration Testing、Firmware Analysis & Secure Coding、Network Security、Encryption & Data Protection、Secure Boot & Authentication、Incident Response & Forensics、Security Training & Awareness、Secure Device Lifecycle Management、Integration with Hospital Security Systems和Cloud Security
地点
-
主要
US,Massachusetts,Boston,02724
Medware Cyber员工
动态
-
Comprehensive SBOMs are a MUST! Are you sure your SBOMs are capturing all of the components from the build AND deployed systems? Crowdstrike "like" news CAN be avoided!
We’re thrilled to share an insightful conversation with MedTech experts Joseph Silvia, MBA and Ken Zalevsky on the importance of SBOMs in the healthcare sector. In this interview, they cover: ?? Why SBOMs are essential for ensuring the security and integrity of healthcare systems. ?? How current SBOMs may be missing critical vulnerabilities, posing significant risks. ?? What medical device manufacturers need to know about these gaps to protect their products and patients. Watch now: https://hubs.la/Q02HJ_XS0 #HealthcareSecurity #SBOM #MedicalDeviceSecurity #CyberSecurity #SBOMSecurity #Healthcare #MedTech #CyberRiskManagement #BHUSA Medware Cyber
Trust What's In Your Tech: An Interview with Joseph Silvia and Ken Zalevsky
https://www.youtube.com/
-
Reflecting on a great week at Blackhat and DEFCON. Huge thanks to Nick Mistry Ken Zalevsky Cassie Crossley Sakthiswaran Rangaraju (Sakthi) ?? Adam Shostack Deb Radcliff Jen Easterly Leo Scott appreciate
-
-
-
-
-
+11
-
-
A cyberattack on the nonprofit blood donation center OneBlood is stifling operations at an organization that normally services more than 350 hospitals across four states, the Orlando-based organization announced today. https://lnkd.in/g_53zKbQ
-
Great addition to the bookshelf from Diana Kelley and Ed Moyle. I've had the opportunity to attend Diana's presentations and looking forward to reading her book. I know it's gonna be fire!
-
-
Great addition to the bookshelf from Diana Kelley and Ed Moyle. I've had the opportunity to attend Diana's presentations and looking forward to reading her book. I know it's gonna be fire!
-
-
The author of this article raises an important point about the need to reevaluate our current approaches to vulnerability management based on the NVD limitations. I also heard various opinions from cyber professionals last week at RSA, including the following strategies to ensure our collective security efforts remain effective: 1. Encourage more organizations and researchers to contribute vulnerability data to the NVD, ensuring the database remains comprehensive and up-to-date. 2.Streamline Vulnerability Disclosure Establish clear guidance and channels for vulnerability disclosure to expedite the process of publishing vulnerability information, enabling organizations to patch and remediate issues more quickly. 3.Integration with Threat Intelligence Combine vulnerability data from the NVD with threat intelligence feeds to provide a more holistic view of the risk landscape, helping organizations prioritize their mitigation efforts more effectively. 4 ML for Predictive Analytics. Leverage machine learning techniques to analyze historical vulnerability data and identify patterns, enabling organizations to anticipate and prepare for emerging threats more effectively. 5.More ISAOs- Collaboration and Information Sharing. Foster an even greater cybersecurity culture of collaboration and information sharing within the cybersecurity community, encouraging organizations to work together to identify, assess, and mitigate vulnerabilities more effectively. I agree that by adopting these strategies and adapting our processes to the ever-changing dynamics of vulnerability management, we can strengthen our collective security efforts and maintain the integrity of our cybersecurity defenses.
The Fall of the National Vulnerability Database https://lnkd.in/eUG5JuE6