Health-ISAC Medical Device Blog – VEX

How VEX Helps Manage Vulnerabilities
Read the blog in TechNation by Health-ISAC VP Medical Device Security Phil Englert here:
https://1technation.com/how-vex-helps-manage-vulnerabilities/
Read this medical device blog to learn about The Vulnerability Exploitability eXchange (VEX)
- – A definition of VEX
- – How VEX leverages data from SBOMs.
- – How to use VEX to check the status of a medical device vulnerability
- – How medical device owners can use VEX to manage cybersecurity vulnerabilities and more
- Related Resources & News
- Potential Terror Threat Targeted at Health Sector – AHA & Health-ISAC Joint Threat Bulletin
- New Cybersecurity Policies Could Protect Patient Health Data
- CyberWire Podcast: PHP flaw sparks global attack wave
- Health-ISAC Hacking Healthcare 3-14-2025
- HSCC Aiming to Identify Healthcare Workflow Chokepoints
- New Healthcare Security Benchmark Highlights Key Investment Priorities and Risks
- Are Efforts to Help Secure Rural Hospitals Doing Any Good?
- CISA cuts $10 million annually from ISAC funding for states amid wider cyber cuts
- 2024 Health-ISAC Discussion Based Exercise Series After-Action Report
- Cobalt Strike takedown effort cuts cracked versions by 80%