Health-ISAC Medical Device Blog – VEX

How VEX Helps Manage Vulnerabilities
Read the blog in TechNation by Health-ISAC VP Medical Device Security Phil Englert here:
https://1technation.com/how-vex-helps-manage-vulnerabilities/
Read this medical device blog to learn about The Vulnerability Exploitability eXchange (VEX)
- – A definition of VEX
- – How VEX leverages data from SBOMs.
- – How to use VEX to check the status of a medical device vulnerability
- – How medical device owners can use VEX to manage cybersecurity vulnerabilities and more
- Related Resources & News
- Healthcare Heartbeat 2024 Q4
- Health-ISAC Hacking Healthcare 2-19-2025
- Podcast: Reflecting on the Change Healthcare cyberattack
- Senate Confirms Trump Pick RFK Jr. to Lead HHS
- The Alarming Backdoor Hiding in 2 Chinese Patient Monitors
- Health-ISAC 2025 Health Sector Cyber Threat Landscape
- How Health Systems Manage Security in the Cloud
- Change Healthcare Attack a Wake-up Call for the Industry
- Five High-Impact Cyberattacks Healthcare Industry Should Avoid in 2025
- Health-ISAC Hacking Healthcare 2-11-2025