3 min
Managed Detection and Response (MDR)
Healthcare Orgs: Do You Need an Outsourced SOC?
Learn how your healthcare organization can benefit from cybersecurity managed services and an outsourced SOC.
5 min
Healthcare Security
Cloud Security Strategies for Healthcare
The healthcare industry must innovate in the cloud to meet patient needs, but organizations need to do so without creating unnecessary or unmanaged risk.
2 min
COVID-19
Supporting Our Medical Professionals in the Age of COVID-19: Cybersecurity in the Healthcare Sector
To better support medical professionals, Rapid7 consulted tech leaders for advice on adapting cybersecurity to the demand presented by COVID-19.
3 min
COVID-19
The Healthcare Security Pro's Guide to Ransomware Attacks
In this blog, we discuss the best practices to defend against ransomware attacks in the healthcare industry.
5 min
Podcast
How to Drive Cybersecurity Transformation in Healthcare
On this week's episode of Security Nation, we spoke with Richard Kaufmann, the information security officer at Amedisys.
2 min
Penetration Testing
This One Time on a Pen Test: Paging Doctor Hackerman
In this blog, one of our penetration testers tells the story of how he hacked X-ray machine and got the keys to the entire network.
9 min
Vulnerability Management
Medical Device Security, Part 3: Putting Safe Scanning into Practice
In this blog post, we put the theory we've built out in our medical device scanning series into practice.
7 min
Vulnerability Management
Medical Device Security, Part 2: How to Give Medical Devices a Security Checkup
In part two of our series, we get into the weeds of medical device scanning and examine how to directly perform assessments on medical devices.
8 min
Vulnerability Management
Medical Device Security, Part 1: How to Scan Devices Without Letting Safety Flatline
When scanning medical devices, it's important to manage risk, be intentional and tread lightly, and never scan computers that are plugged into people.
4 min
Healthcare Security
Top 5 Threats Healthcare Organizations Face and How to Combat Them
Looking to protect your healthcare organization from cyber-threats? Here are the top five threats to look out for and tips on how to outsmart attackers.
2 min
Penetration Testing
Top 3 Takeaways from the "Healthcare Insomnia: Get the Prescription to Secure Unique Devices, People, and Organizations" Webcast
This week we were lucky enough to hear from Jay Radcliffe
[http://www.reuters.com/article/2014/05/29/us-rapid7-radcliffe-idUSKBN0E929K20140529]
, senior security researcher at Rapid7, in the webcast, "Healthcare Insomnia:
Get the Prescription to Secure Unique Devices, People, and Organizations
[https://information.rapid7.com/healthcare-insomnia-webcast.html?CS=blog]".
Healthcare environments are complex - they're combining devices and data that
have been around for 20 years with the newest techn