• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Healthcare

Cybersecurity Leaders Are Talking A Lot About Counterfeit Devices

  • Posted on:May 7, 2019
  • Posted in:Hacks, Healthcare, Internet of Things, Security
  • Posted by:
    Greg Young (Vice President for Cybersecurity)
0

Malice Vs Greed Most discussion about security in the supply chain has been focused on detecting tampering, or preventing backdoors or sneaky things being inserted into components and software. There’s another aspect emerging and will dwarf the tampering: devices that are counterfeited for profit indirectly causing security problems. Counterfeit devices are ones that either by…

Read More
Tags: Counterfeit DevicescybersecurityIoT

AWS Helping to Unlock Potentially Life-saving Innovation for the Healthcare Sector – While Keeping Sensitive Information Locked Down

  • Posted on:November 26, 2018
  • Posted in:AWS, Business, Healthcare, Security
  • Posted by:
    Trend Micro
0

Marnie Wilking – CISO, VP Information Assurance, Orion Health Many of the next significant, potentially lifesaving discoveries that will happen in healthcare will be the direct result of big data, machine learning and artificial intelligence. Making the shift to big data, machine learning and artificial intelligence (AI) is something 42 percent of professionals believe will…

Read More
Tags: healthcareOrion Health

Preparing for Shadow OT: A Hospital Case Study

  • Posted on:July 25, 2018
  • Posted in:Business, Healthcare, Internet of Things, Security
  • Posted by:
    William "Bill" Malik (CISA VP Infrastructure Strategies)
0

The convergence of IT and OT is happening more rapidly than IT expects. Once upon a time, IT was so expensive that enterprises built entire departments to prioritize spending and efficiently manage those costly investments. Now, IT is so inexpensive that any individual who wants IT can buy it (or rent it). This is “Shadow…

Read More
Tags: IoTShadow OT

The Risks of Bio-IoT

  • Posted on:April 25, 2018
  • Posted in:Healthcare, Internet of Things, Security
  • Posted by:
    William "Bill" Malik (CISA VP Infrastructure Strategies)
0
The typical enterprise has more than 500 applications in place.

Bio-IoT: Internet of Things applied to biological systems, such as pharmaceutical delivery systems, implanted medical devices, intelligent prosthetics, surgical assistants, and remote patient monitoring. IoT 2.0, with ample processing resources and OSI-conformant networking, promises vast improvements in health care. A recent paper from the IEEE describes a bright future for medical IoT (The Internet of…

Read More
Tags: BioIotICSindustrial control systemsInternet of Things

The Role That IT Security Teams Need to Play in Connected Hospitals

  • Posted on:April 10, 2018
  • Posted in:Business, Healthcare, Security
  • Posted by:
    Ed Cabrera (Chief Cybersecurity Officer)
0

The WannaCry outbreak that reportedly raked in US$1B in damage costs also forced doctors to cancel scheduled appointments, among other things, brought on warranted concern over pervasive ransomware attacks that could stem from oft-overlooked components of healthcare networks—exposed medical cyber assets and third-party partners. It’s a well-known fact that advances in medical technology and information…

Read More
Tags: business securityhealthcarehealthcare industry technologyhipaaWannaCry

Revealing the True Cyber-Risks Facing Connected Healthcare Providers

  • Posted on:April 5, 2018
  • Posted in:Business, Healthcare, Security
  • Posted by:
    Greg Young (Vice President for Cybersecurity)
0

Technology is the beating heart of any modern hospital. Advances in cloud, IoT and digital IT systems have helped healthcare organizations (HCOs) greatly improve the quality of care offered to patients. Electronic health records are the backbone of an increasingly complex patient care network. But it has also exposed them to even greater risks of…

Read More
Tags: healthcarehealthcare information securityhealthcare organizationssupply chainWannaCry

Trend Micro at HiMSS: Protecting Healthcare Organizations with Optimized, Connected Security

  • Posted on:March 7, 2018
  • Posted in:Healthcare, Security
  • Posted by:
    Trend Micro
0

Submitted by Elie Nasrallah
, Director – Cyber Security Strategy
 The healthcare industry remains one of the most frequently targeted sectors in the United States. It accounted for nearly a quarter (23%) of all breaches reported in 2017, second only to the business category, in another record year for data theft. That’s why Trend Micro has been a…

Read More
Tags: healthcare organizations (HCOs)HiMSS

Taking Healthcare Threat Protection to the Next Level with HITRUST

  • Posted on:October 3, 2017
  • Posted in:Healthcare, Security
  • Posted by:
    Mike Gibson
0

Healthcare organizations (HCOs) worldwide continue to be on the receiving end of cyber-attacks. But if we work together we have both the tools and motivation to turn this around. That’s why Trend Micro has been a long-time partner and advocate of the great work HITRUST is doing to help improve baseline cybersecurity resilience and maturity…

Read More

Further Advances the State of Cyber Threat Information Sharing into Cyber Threat Management and Response

  • Posted on:August 3, 2017
  • Posted in:Business, Healthcare, Security
  • Posted by:
    Ed Cabrera (Chief Cybersecurity Officer)
0

Healthcare organizations (HCOs) are not immune to large-scale cyberattacks, as evident by the most recent attacks WannaCry and Petya. In fact, HCOs are an attractive target for hackers because of the immense amount of personally identifiable information housed in their systems. The industry is widely known for having a broad spectrum of cybersecurity maturity, from…

Read More

How IOC Sharing Will Help Us Build a More Secure Healthcare Sector

  • Posted on:June 8, 2017
  • Posted in:Healthcare, Security
  • Posted by:
    Ed Cabrera (Chief Cybersecurity Officer)
0

At Trend Micro we work hard every day to reduce the risk posed by cyber attacks from hacktavists, transnational cybercriminals, and cyber espionage groups. Nowhere is this more pertinent than in the healthcare industry, where everything from data breaches to ransomware attacks impacting medical devices could have a serious impact on patient care. This is…

Read More
Page 1 of 3123

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, MĂŠxico
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, EspaĂąa, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.