Health-ISAC Medical Device Blog – VEX
How VEX Helps Manage Vulnerabilities
Read the blog in TechNation by Health-ISAC VP Medical Device Security Phil Englert here:
https://1technation.com/how-vex-helps-manage-vulnerabilities/
Read this medical device blog to learn about The Vulnerability Exploitability eXchange (VEX)
- – A definition of VEX
- – How VEX leverages data from SBOMs.
- – How to use VEX to check the status of a medical device vulnerability
- – How medical device owners can use VEX to manage cybersecurity vulnerabilities and more
- Related Resources & News
- AI, Ransomware, and Medical Devices: Safeguarding Healthcare
- Securing Health Data in 2025: The Rising Cybersecurity Challenges
- Software Supply Chains and ISACs – The Inevitability Curve Podcast EP14
- Health-ISAC Hacking Healthcare 1-17-2025
- New HIPAA Cybersecurity Rules Pull No Punches
- What’s in HHS’ Proposed HIPAA Security Rule Overhaul?
- Cyber Threats Know No Borders
- Health-ISAC Hacking Healthcare 1-10-2025
- Google’s rural healthcare cybersecurity initiative
- Gen Z is stealing your health data—and the consequences may be worse than you think