The medical device market in the United States accounts for almost 5% of the total
healthcare market with total annual spend of $3 trillion. This market includes a wide
range of products from simple devices like thermometers to more complex IoT devices
like patient monitors, smart infusion pumps, and MRI...
Your work is important. Patients and medical staff worldwide benefit from
the life-changing and life-saving connected medical devices that you are
developing. Yet these devices are more complex than ever as is their path
to the marketplace.
Engineers are rethinking their workflows to confront
these issues and...
The steady barrage of acquisition reports around publicly traded digital experience vendor Akamai has intensified in recent weeks. The latest salvo landed Monday when StreetInsider reported that the intelligent edge platform provider held talks with a private equity firm about a potential takeover.
"It's stupid and adds zero value," writes Ian Keller, director of security at a telecom company, about connecting hospital networks - and especially life-sustaining information - to the internet. He encourages CISOs to be socially responsible about their moral obligation to patients.
Security researchers revealed yet another method for stealing a Tesla although the brand is one of the least-stolen cars and among the most recovered once pilfered. The newest example comes from internet of things security company IOActive in an attack involving two people and customized gear.
Vulnerabilities in certain medication infusion pump products from manufacturer Baxter could compromise a hospital's biomedical network. The flaws highlight the risks involving the acquisition and disposal of medical technology, says researcher Deral Heiland of Rapid7.
Attackers could block access to every Contec patient monitoring device connected to a hospital network by sending a single malformed packet, security researchers warn. U.S. authorities say China-based Contec hasn't responded to outreach to fix the flaws.
Federal authorities, in two separate advisories issued Thursday, urge healthcare sector entities to proactively address security risks from internet of things devices equipped with sensors, software and other technologies to connect and exchange data over the internet and from open web applications.
John Kindervag, creator of zero trust and senior vice president at ON2IT, and Grant Schneider, senior director at Venable, join ISMG editors to discuss the latest Log 4j findings, threats posed by a Chinese-made automotive GPS tracker and the challenges of a distributed workforce.
The cybersecurity of devices that use semiconductors is imperative in today's digital world, says Prathap R. This security industry veteran, who has 16 years of experience in semiconductors, discusses how IoT security has evolved over the past two decades.
In today’s dynamic environment, with the proliferation of a wide array of different security products and the high chance for misconfigurations, testing security is more imperative than ever, says Scott Register, vice president of security solutions at Keysight.
“The only way to see if all these products have...
The proliferation of IoT devices and cloud has created a more vulnerable attack landscape, while technologies such as AI and deep learning can potentially thwart zero-day threats, says Itai Greenberg, chief strategy officer at Check Point Software Technologies.
Since joining Forescout 15 months ago as CEO, Wael Mohamed has aggressively pursued acquisitions, scooping up CyberMDX in February to safeguard internet of medical things devices and Cysiv in June to help OT and IoT customers analyze, detect and respond to threats using cloud-native data analytics.
Former Rockwell Automation CISO Dawn Cappelli discusses the mission of the new Dragos OT-CERT - a cybersecurity resource designed to help industrial asset owners and operators build their OT cybersecurity programs, improve their security postures and reduce OT risk - and her role as its director.
As more devices connect to networks, keeping track of them all is job number one. What is connected? Are those devices vulnerable? Where do they communicate? Who can access them? What active threats are out there? It's confusing to say the least. To clear this confusion, you need to make sense of all your XIoT. Each...