RESEARCH, NOT MARKETING

No single entity is going to "fix" medical device cybersecurity on their own. So we are dedicated to helping advance our industry's understanding of the challenges and opportunities we face through research. The documents below are free to download, and we’re not going to do that thing where we ask for your email address in order to download them. Enjoy!

img
 
IMPACT OF MONITORING ON MEDICAL DEVICE VULNERABILITIES

The root causes associated with medical device cybersecurity disclosures to date, reveals 81.8% of the related root causes would be impacted by the implementation of monitoring practices.

DOWNLOAD
img
 
WHAT MEDICAL DEVICE VENDORS CAN LEARN FROM
PAST CYBERSECURITY VULNERABILITY DISCLOSURES

An analysis of ICS-CERT cybersecurity disclosures reveals device vendors reported 400% more vulnerabilities per quarter since the FDA released their Cybersecurity Guidance, but this may be a sign of improving compliance among vendors.

DOWNLOAD
img
 
A MEDICAL DEVICE CYBERSECURITY TOOLBOX

Complying with FDA cybersecurity regulations requires a variety of processes and technologies. A hypothetical device vendor’s approach to securing their product is analyzed, and leading tools are identified.

DOWNLOAD
img
 
A TOOL IN MEDICAL DEVICE CYBERSECURITY

In prior white papers we addressed the increasing concern about cybersecurity in devices and the broad range of technologies that can be helpful in addressing this concern. In the following pages we will highlight the specific cybersecurity requirements that can be satisfied using various features of MedCrypt.

DOWNLOAD