Feb. 19, 2024, 7:31 p.m. | John Breeden II

HealthTech Magazine healthtechmagazine.net

Healthcare organizations face a challenging cybersecurity environment, with numerous connected devices, applications and users they must manage on their networks to support patient care. A smart hospital bed or an infusion pump may have vulnerabilities that can become attack vectors, offering a bridge into the core network.
This complex network environment can also make it difficult to implement advanced security approaches such as zero trust, since the risk of cutting off critical medical devices from backend databases and other assets …

applications become bridge connected devices core cybersecurity devices environment face healthcare hospital journey network networks organizations patient patient care review smart support trust vectors vulnerabilities

More from healthtechmagazine.net / HealthTech Magazine

AI Research Scientist

@ Vara | Berlin, Germany and Remote

Data Architect

@ University of Texas at Austin | Austin, TX

Data ETL Engineer

@ University of Texas at Austin | Austin, TX

Lead GNSS Data Scientist

@ Lurra Systems | Melbourne

Senior Machine Learning Engineer (MLOps)

@ Promaton | Remote, Europe

Robotics Technician - 3rd Shift

@ GXO Logistics | Perris, CA, US, 92571