Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
'HIPAA Not Helping': Healthcare's Software Security Lagging
Newest First  |  Oldest First  |  Threaded View
Dan9126
50%
50%
Dan9126,
User Rank: Apprentice
3/12/2016 | 3:33:42 PM
Healthcare security
The problem seems to me not to be one of training, but of managerial well. Remediation of known vulnerabilities is frequently hampered by management fear that services will be interrupted, compounded by vendors who are completely unwilling to patch software current. Add to this woman and unwillingness to budget for an infrastructure that can keep these things safely managed and monitored, and you have our current train wreck.
GaryM2712105
100%
0%
GaryM2712105,
User Rank: Strategist
10/23/2015 | 9:22:35 AM
Re: RE Bug Bounty for Healthcare
That does seem like a reasonable way to look at it.  FWIW, we only added bug bounty as an activity to the BSIMM in BSIMM-V (oct 2013) when it began to appear.  Remember, BSIMM only describes what is actually going on out there.  

 

In my view, the bug bounty hype these days is outstripping bug bounty reality on the ground.  But bug bounty systems are growing.

gem
jason.haddix
50%
50%
jason.haddix,
User Rank: Apprentice
10/23/2015 | 12:36:59 AM
RE Bug Bounty for Healthcare
Very peculiar... Aetna says no bug bounty yet Synack IS a crowdsourced security vendor, a bug bounty program. They use that terminology themselves when it benefits them. Google the Forbes Article called: Synack Crowdsourcing Bug Bounty

www.forbes.com/video/3775809296001 

BSIMM6 seems great but might need to do some due diligence on the definitions of some vendors and success. I know many healthcare companies succeeding using bug bounty programs. Their ROI is outstanding vs traditional security consulting.
kim1green
50%
50%
kim1green,
User Rank: Apprentice
10/23/2015 | 12:12:03 AM
Re: Bug bounties and healthcare
Let's look at the data in another way. One or two years ago the number of bug bounty programs was likely zero, indicating the number of implemented programs will continue to grow. I do know several current members are looking to implement private bug bounty programs. Acknowledging that it remains challenging to implement bug bounty programs in healthcare because companies are reluctant to expose public facing systems that contain PHI. However, healthcare security leaders also recognize that their companies have many other critical systems that do not contain PHI and are looking to implement private bug bounty programs for these systems. The majority of security leaders that I speak to do see crowdsourcing in their company's future.
caseyjohnellis
50%
50%
caseyjohnellis,
User Rank: Apprentice
10/22/2015 | 11:52:31 PM
Re: Bug bounties and healthcare
"In our business of healthcare, it makes no sense at all"

Zephyr Health, one of the interviewed companies in BSIMM and a healthcare company, runs a bug bounty program... hence the comment about this statement being unusual

It clearly makes at least some sense, otherwise Cigital wouldn't have included such odd outlier in it's study.

Download the data for yourself ;)
GaryM2712105
100%
0%
GaryM2712105,
User Rank: Strategist
10/21/2015 | 9:17:58 PM
Re: Bug bounties and healthcare
According to BSIMM6 data, that is not the case.  Only 3 of 78 firms had a bug bounty system going when we measured them.

Download the data for yourself.
caseyjohnellis
100%
0%
caseyjohnellis,
User Rank: Apprentice
10/20/2015 | 7:21:00 PM
Bug bounties and healthcare
Jim Routh's comments are interesting given the Zephyr Health run a bug bounty program: https://www.youtube.com/watch?v=GbW777t1tTA


NSA Appoints Rob Joyce as Cyber Director
Dark Reading Staff 1/15/2021
Vulnerability Management Has a Data Problem
Tal Morgenstern, Co-Founder & Chief Product Officer, Vulcan Cyber,  1/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-20949
PUBLISHED: 2021-01-20
Bleichenbacher's attack on PKCS #1 v1.5 padding for RSA in STM32 cryptographic firmware library software expansion for STM32Cube (UM1924). The vulnerability can allow one to use Bleichenbacher's oracle attack to decrypt an encrypted ciphertext by making successive queries to the server using the vul...
CVE-2020-25683
PUBLISHED: 2021-01-20
A flaw was found in dnsmasq before version 2.83. A heap-based buffer overflow was discovered in dnsmasq when DNSSEC is enabled and before it validates the received DNS entries. A remote attacker, who can create valid DNS replies, could use this flaw to cause an overflow in a heap-allocated memory. T...
CVE-2020-25684
PUBLISHED: 2021-01-20
A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in the forward.c:reply_query() if the reply destination address/port is used by the pending forwarded queries. However, it does not use the address/port to retrieve the exact forwarded query,...
CVE-2020-25685
PUBLISHED: 2021-01-20
A flaw was found in dnsmasq before version 2.83. When getting a reply from a forwarded query, dnsmasq checks in forward.c:reply_query(), which is the forwarded query that matches the reply, by only using a weak hash of the query name. Due to the weak hash (CRC32 when dnsmasq is compiled without DNSS...
CVE-2020-35271
PUBLISHED: 2021-01-20
Employee Performance Evaluation System in PHP/MySQLi with Source Code 1.0 is affected by cross-site scripting (XSS) in the Employees, First Name and Last Name fields.