Healthcare IT News March 30, 2022
Seth Fogie

When implemented correctly, these programs can effectively crowdsource security research and testing services to help uncover real world exploitable vulnerabilities.

Healthcare security teams are under intense pressure to secure their environments from a growing number of threats.

Teams are often understaffed, constantly catching up with an onslaught of threats and vulnerabilities, and asked to secure legacy devices from the 1990’s – all while supporting other innovative health system teams who are raising the bar when it comes to architecting data analytics solutions and developing patient facing applications to provide a customer friendly healthcare experience.

There just aren’t enough hours in a day or even a year to do it all. This is where incorporating bug bounty programs may pay off...

Today's Sponsors

LEK
ZeOmega

Today's Sponsor

LEK

 
Topics: Cybersecurity, Health IT, Provider, Technology
WEDI asks HHS to ensure info exchange capabilities after cyberattacks
The state-by-state impact of Ascension’s cyberattack
Microsoft warns of hacker misusing Quick Assist in Black Basta ransomware attacks
AI raises CIO cyber anxieties
Cyberattack fallout: Ascension and DocGo troubles ricochet

Share This Article