Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
'HIPAA Not Helping': Healthcare's Software Security Lagging
Newest First  |  Oldest First  |  Threaded View
Dan9126
Dan9126,
User Rank: Apprentice
3/12/2016 | 3:33:42 PM
Healthcare security
The problem seems to me not to be one of training, but of managerial well. Remediation of known vulnerabilities is frequently hampered by management fear that services will be interrupted, compounded by vendors who are completely unwilling to patch software current. Add to this woman and unwillingness to budget for an infrastructure that can keep these things safely managed and monitored, and you have our current train wreck.
GaryM2712105
GaryM2712105,
User Rank: Strategist
10/23/2015 | 9:22:35 AM
Re: RE Bug Bounty for Healthcare
That does seem like a reasonable way to look at it.  FWIW, we only added bug bounty as an activity to the BSIMM in BSIMM-V (oct 2013) when it began to appear.  Remember, BSIMM only describes what is actually going on out there.  

 

In my view, the bug bounty hype these days is outstripping bug bounty reality on the ground.  But bug bounty systems are growing.

gem
jason.haddix
jason.haddix,
User Rank: Apprentice
10/23/2015 | 12:36:59 AM
RE Bug Bounty for Healthcare
Very peculiar... Aetna says no bug bounty yet Synack IS a crowdsourced security vendor, a bug bounty program. They use that terminology themselves when it benefits them. Google the Forbes Article called: Synack Crowdsourcing Bug Bounty

www.forbes.com/video/3775809296001 

BSIMM6 seems great but might need to do some due diligence on the definitions of some vendors and success. I know many healthcare companies succeeding using bug bounty programs. Their ROI is outstanding vs traditional security consulting.
kim1green
kim1green,
User Rank: Apprentice
10/23/2015 | 12:12:03 AM
Re: Bug bounties and healthcare
Let's look at the data in another way. One or two years ago the number of bug bounty programs was likely zero, indicating the number of implemented programs will continue to grow. I do know several current members are looking to implement private bug bounty programs. Acknowledging that it remains challenging to implement bug bounty programs in healthcare because companies are reluctant to expose public facing systems that contain PHI. However, healthcare security leaders also recognize that their companies have many other critical systems that do not contain PHI and are looking to implement private bug bounty programs for these systems. The majority of security leaders that I speak to do see crowdsourcing in their company's future.
caseyjohnellis
caseyjohnellis,
User Rank: Apprentice
10/22/2015 | 11:52:31 PM
Re: Bug bounties and healthcare
"In our business of healthcare, it makes no sense at all"

Zephyr Health, one of the interviewed companies in BSIMM and a healthcare company, runs a bug bounty program... hence the comment about this statement being unusual

It clearly makes at least some sense, otherwise Cigital wouldn't have included such odd outlier in it's study.

Download the data for yourself ;)
GaryM2712105
GaryM2712105,
User Rank: Strategist
10/21/2015 | 9:17:58 PM
Re: Bug bounties and healthcare
According to BSIMM6 data, that is not the case.  Only 3 of 78 firms had a bug bounty system going when we measured them.

Download the data for yourself.
caseyjohnellis
caseyjohnellis,
User Rank: Apprentice
10/20/2015 | 7:21:00 PM
Bug bounties and healthcare
Jim Routh's comments are interesting given the Zephyr Health run a bug bounty program: https://www.youtube.com/watch?v=GbW777t1tTA


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Practical Network Security Approaches for a Multicloud, Hybrid IT World
The report covers areas enterprises should focus on for their multicloud/hybrid cloud security strategy: -increase visibility over the environment -learning cloud-specific skills -relying on established security frameworks -re-architecting the network
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-30333
PUBLISHED: 2022-05-09
RARLAB UnRAR before 6.12 on Linux and UNIX allows directory traversal to write to files during an extract (aka unpack) operation, as demonstrated by creating a ~/.ssh/authorized_keys file. NOTE: WinRAR and Android RAR are unaffected.
CVE-2022-23066
PUBLISHED: 2022-05-09
In Solana rBPF versions 0.2.26 and 0.2.27 are affected by Incorrect Calculation which is caused by improper implementation of sdiv instruction. This can lead to the wrong execution path, resulting in huge loss in specific cases. For example, the result of a sdiv instruction may decide whether to tra...
CVE-2022-28463
PUBLISHED: 2022-05-08
ImageMagick 7.1.0-27 is vulnerable to Buffer Overflow.
CVE-2022-28470
PUBLISHED: 2022-05-08
marcador package in PyPI 0.1 through 0.13 included a code-execution backdoor.
CVE-2022-1620
PUBLISHED: 2022-05-08
NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.