Health-ISAC Medical Device Blog – VEX
How VEX Helps Manage Vulnerabilities
Read the blog in TechNation by Health-ISAC VP Medical Device Security Phil Englert here:
https://1technation.com/how-vex-helps-manage-vulnerabilities/
Read this medical device blog to learn about The Vulnerability Exploitability eXchange (VEX)
- – A definition of VEX
- – How VEX leverages data from SBOMs.
- – How to use VEX to check the status of a medical device vulnerability
- – How medical device owners can use VEX to manage cybersecurity vulnerabilities and more
- Related Resources & News
- Health-ISAC Hacking Healthcare 8-26-2024
- What is Threat Intelligence? A Comprehensive Overview
- Why Cybercriminals Target Healthcare Data and How Organisations Can Protect Themselves
- Federal Authorities Work to Boost Health-Care Cybersecurity
- Health-ISAC Hacking Healthcare 8-9-2024
- Podcast: Health-ISAC Featured in Cyberwire Daily episode 2021
- Health-ISAC Hacking Healthcare 8-2-2024
- Protecting Healthcare Organizations with Human-Centric Email Security
- American Hospital Association and Health-ISAC Joint Threat Bulletin
- Monthly Newsletter – August 2024