Cyber Security & Medical Technology – usd AG at MT-Connect.

16. April 2018

Nürnberg, 11 April 2018. As part of the “Digital Technologies and Future Med-Tech” event, usd AG security experts performed live hacking at the MT-Connect trade fair for medical technology..
Christian Frei, Head of Security Analysis & Pentests at usd AG, comments: “The rapidly advancing digitalisation in healthcare benefits both patients and healthcare professionals. Unfortunately, these advantages are also offset by massive risks in the form of digital attack vectors. The danger is real, we show what it’s all about and how to protect yourself.”
Under the heading “Cyber Security for the Internet of Medical Things”, usd AG IT security experts demonstrated how easy it currently is to gain access to systems and data of third parties. In the course of the event, various attack scenarios against typical company IT infrastructures and situations were described and attacks were demonstrated. The aim was to raise awareness for the current digital risks and to show potential solutions.

Also interesting:

DORA Countdown: One Month Left Until the Deadline

DORA Countdown: One Month Left Until the Deadline

DORA, the Digital Operational Resilience Act, will fully apply as of 17 January 2025. We have summarized everything you need to know about the EU regulation, preparation and best practices from our news blog.

Sunset of PCI DSS v4.0 on 31 December 2024: Get Ready!

Sunset of PCI DSS v4.0 on 31 December 2024: Get Ready!

PCI DSS v4.0: In March 2024, version 4.0 of the Payment Card Industry Data Security Standard became mandatory after a two-year transition phase. Just a few months later, version 4.0.1 was released as a minor update of the standard, which will become mandatory on...

Top 3 Vulnerabilities in SSO Pentests

Top 3 Vulnerabilities in SSO Pentests

During their penetration tests (pentests), our security analysts at usd HeroLab repeatedly uncover vulnerabilities that pose significant risks to corporate security. They increasingly encounter the same vulnerabilities. Our blog series "Top 3 Vulnerabilities" presents...

Categories

Categories