Using Software Bill of Materials (SBOMs) For Medical Device Security
A software bill of materials (SBOM) provides a list of all software components in a given device, enabling transparency by allowing device manufacturers, buyers, and operators to identify and mitigate vulnerabilities and manage medical...How to Implement a Cyber Incident Response Plan for Healthcare
Having a cyber incident response plan in healthcare is required under HIPAA, but that does not mean that every healthcare organization actually has a comprehensive and actionable plan tailored specifically to their organization. When...3 Keys to Third-Party Risk Management at WellSpan Health
Third-party risk management is a crucial tenet of WellSpan Health’s cybersecurity infrastructure. The South-Central Pennsylvania integrated health system engages with thousands of vendors, 30,000 endpoints, and 26,000 users, a fifth...The Threat of Distributed Denial-Of-Service Attacks in Healthcare
Distributed denial-of-service (DDoS) attacks flood a victim’s network with traffic, rendering network resources unusable. Often, DDoS attacks serve as a distraction while bad actors deploy more sinister malware on their...The Importance of Third-Party Risk Assessments in Healthcare
Healthcare organizations can have the most sophisticated internal security protocols, but failing to assess third-party risk may leave organizations vulnerable to data breaches nonetheless. Threat actors are increasingly using third-party...CISOs Call for Healthcare Cybersecurity Federal Assistance
Most chief information security officers (CISOs) reported needing additional federal assistance to combat healthcare cybersecurity threats, according to a survey fielded by the College of Healthcare...5 Strategies to Improve Healthcare Cyber Resiliency
Cyber resiliency is the armor that healthcare organizations need to defend against cybercriminals. Equipped with the tools to prevent, prepare, and respond, organizations can significantly reduce the...Sponsored by SAI360