Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
'HIPAA Not Helping': Healthcare's Software Security Lagging
Newest First  |  Oldest First  |  Threaded View
Dan9126
50%
50%
Dan9126,
User Rank: Apprentice
3/12/2016 | 3:33:42 PM
Healthcare security
The problem seems to me not to be one of training, but of managerial well. Remediation of known vulnerabilities is frequently hampered by management fear that services will be interrupted, compounded by vendors who are completely unwilling to patch software current. Add to this woman and unwillingness to budget for an infrastructure that can keep these things safely managed and monitored, and you have our current train wreck.
GaryM2712105
100%
0%
GaryM2712105,
User Rank: Strategist
10/23/2015 | 9:22:35 AM
Re: RE Bug Bounty for Healthcare
That does seem like a reasonable way to look at it.  FWIW, we only added bug bounty as an activity to the BSIMM in BSIMM-V (oct 2013) when it began to appear.  Remember, BSIMM only describes what is actually going on out there.  

 

In my view, the bug bounty hype these days is outstripping bug bounty reality on the ground.  But bug bounty systems are growing.

gem
jason.haddix
50%
50%
jason.haddix,
User Rank: Apprentice
10/23/2015 | 12:36:59 AM
RE Bug Bounty for Healthcare
Very peculiar... Aetna says no bug bounty yet Synack IS a crowdsourced security vendor, a bug bounty program. They use that terminology themselves when it benefits them. Google the Forbes Article called: Synack Crowdsourcing Bug Bounty

www.forbes.com/video/3775809296001 

BSIMM6 seems great but might need to do some due diligence on the definitions of some vendors and success. I know many healthcare companies succeeding using bug bounty programs. Their ROI is outstanding vs traditional security consulting.
kim1green
50%
50%
kim1green,
User Rank: Apprentice
10/23/2015 | 12:12:03 AM
Re: Bug bounties and healthcare
Let's look at the data in another way. One or two years ago the number of bug bounty programs was likely zero, indicating the number of implemented programs will continue to grow. I do know several current members are looking to implement private bug bounty programs. Acknowledging that it remains challenging to implement bug bounty programs in healthcare because companies are reluctant to expose public facing systems that contain PHI. However, healthcare security leaders also recognize that their companies have many other critical systems that do not contain PHI and are looking to implement private bug bounty programs for these systems. The majority of security leaders that I speak to do see crowdsourcing in their company's future.
caseyjohnellis
50%
50%
caseyjohnellis,
User Rank: Apprentice
10/22/2015 | 11:52:31 PM
Re: Bug bounties and healthcare
"In our business of healthcare, it makes no sense at all"

Zephyr Health, one of the interviewed companies in BSIMM and a healthcare company, runs a bug bounty program... hence the comment about this statement being unusual

It clearly makes at least some sense, otherwise Cigital wouldn't have included such odd outlier in it's study.

Download the data for yourself ;)
GaryM2712105
100%
0%
GaryM2712105,
User Rank: Strategist
10/21/2015 | 9:17:58 PM
Re: Bug bounties and healthcare
According to BSIMM6 data, that is not the case.  Only 3 of 78 firms had a bug bounty system going when we measured them.

Download the data for yourself.
caseyjohnellis
100%
0%
caseyjohnellis,
User Rank: Apprentice
10/20/2015 | 7:21:00 PM
Bug bounties and healthcare
Jim Routh's comments are interesting given the Zephyr Health run a bug bounty program: https://www.youtube.com/watch?v=GbW777t1tTA


News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23381
PUBLISHED: 2021-04-18
This affects all versions of package killing. If attacker-controlled user input is given, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
CVE-2021-23374
PUBLISHED: 2021-04-18
This affects all versions of package ps-visitor. If attacker-controlled user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
CVE-2021-23375
PUBLISHED: 2021-04-18
This affects all versions of package psnode. If attacker-controlled user input is given to the kill function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
CVE-2021-23376
PUBLISHED: 2021-04-18
This affects all versions of package ffmpegdotjs. If attacker-controlled user input is given to the trimvideo function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.
CVE-2021-23377
PUBLISHED: 2021-04-18
This affects all versions of package onion-oled-js. If attacker-controlled user input is given to the scroll function, it is possible for an attacker to execute arbitrary commands. This is due to use of the child_process exec function without input sanitization.