TechSpective Podcast 116 - Chris Gates

Real World Impact of Medical Device Security

TechSpective Podcast Episode 116   Getting hacked sucks in all scenarios. In most cases, though, getting hacked is an inconvenience. In some cases, it is deadly. Having your data stolen, or getting ...
CSPM, ASPM, CISA cybersecurity healthcare

FDA, MDIC and MITRE Publish Medical Device Threat Modeling Playbook

Modern medical devices are complex, networked and often vulnerable to attack. With that in mind, the U.S. Food and Drug Administration (FDA) has funded the development of a playbook for threat modeling ...
Security Boulevard
ransomware health care

Health Care Under Cyberattack: Unprotected Medical IoT Devices Threaten Patient Care

Connected devices bring organizations more information and convenience, but they also increase an organization’s attack surface—and medical devices are no different. According to a survey released by reviews platform provider Capterra, as ...
Security Boulevard
ransomware health care

How to Protect Medical Devices from Ransomware

Cyberattacks on hospitals are rising, and patients are worried. Is my personal data at risk? Could ransomware or hackers effectively shut down the ER near me?  Consider these findings from a March ...
Security Boulevard
Medical device security in a pandemic world

Medical device security in a pandemic world

The pandemic has put a lot of things on hold over the last year, but medical device security shouldn’t be one of them. The post Medical device security in a pandemic world ...
Hacking medical devices: Five ways to inoculate yourself from attacks

Hacking medical devices: Five ways to inoculate yourself from attacks

Healthcare companies must follow medical device security best practices to defend against attacks on devices and the networks and systems they connect to. The post Hacking medical devices: Five ways to inoculate ...
ransomware health care

Survey Finds Low Confidence in Medical Device Security

As more medical devices connect to the Internet, the role of cybersecurity in the health care sector has never been more critical. Unfortunately, a survey of 40 senior executives at U.S. Fortune ...
Security Boulevard
Uncover SweynTooth vulnerabilities with Defensics fuzz testing

Uncover SweynTooth vulnerabilities with Defensics fuzz testing

SweynTooth is a set of Bluetooth Low Energy vulnerabilities. We can reproduce many of these vulnerabilities using Defensics Bluetooth LE Test Suites. The post Uncover SweynTooth vulnerabilities with Defensics fuzz testing appeared ...