{"id":624378,"date":"2023-04-01T12:49:43","date_gmt":"2023-04-01T17:49:43","guid":{"rendered":"https:\/\/news.sellorbuyhomefast.com\/index.php\/2023\/04\/01\/eracent-offers-healthcare-orgs-free-access-to-sbom-analytics-software\/"},"modified":"2023-04-01T12:49:43","modified_gmt":"2023-04-01T17:49:43","slug":"eracent-offers-healthcare-orgs-free-access-to-sbom-analytics-software","status":"publish","type":"post","link":"https:\/\/newsycanuse.com\/index.php\/2023\/04\/01\/eracent-offers-healthcare-orgs-free-access-to-sbom-analytics-software\/","title":{"rendered":"Eracent offers healthcare orgs free access to SBOM analytics software"},"content":{"rendered":"<p>Business News <\/p>\n<div property=\"content:encoded\">\n<p>Because it is getting harder to underestimate &#8220;the evil genius of the modern-day cybercriminal,&#8221; Eracent, which develops asset management tools for software and IT, says it will offer healthcare organizations a no-cost tool that can automate the scanning of medical devices&#8217; software bills of materials and match listed components to vulnerability data in its product library.<\/p>\n<p><strong>WHY IT MATTERS<\/strong><\/p>\n<p>Beginning October 1, the U.S. Food and Drug Administration announced that\u00a0<a data-mce-href=\"https:\/\/www.fda.gov\/media\/166614\/download\" href=\"https:\/\/www.fda.gov\/media\/166614\/download\" target=\"_blank\" rel=\"noopener\">new medical device submissions must contain a detailed cybersecurity plan<\/a>\u00a0for how manufacturers will monitor and address vulnerabilities.<\/p>\n<p>Part of the\u00a0<a data-mce-href=\"https:\/\/www.healthcareitnews.com\/news\/ata-applauds-2-year-extension-telehealth-flexibilities-congressional-omnibus\" href=\"https:\/\/www.healthcareitnews.com\/news\/ata-applauds-2-year-extension-telehealth-flexibilities-congressional-omnibus\" target=\"_blank\" rel=\"noopener\">2022 Omnibus Appropriations Act<\/a>, the long-awaited measure gives the FDA the authority to require the SBOM with each medical device.\u00a0<\/p>\n<p>&#8220;An SBOM by itself is impotent and ineffective if it is not constantly scrutinized by an automated, proactive process with instant visibility and vigilance in mitigating and resolving any component-level security weaknesses across the life cycle of the hardware\/software device,&#8221; said Walt Szablowski, Eracent founder and executive chairman, in the announcement.<\/p>\n<p>The C-SCRM platform recognizes obsolete components that can increase security risks, including open-source software components within applications that standard vulnerability analysis tools do not scan, according to Eracent.<\/p>\n<p>The global enterprise network management company, with its U.S. base in Riegelsville, Pennsylvania, says that it is offering access to its device-analytics platform to get all healthcare sectors affected by new medical device cybersecurity regulations on the road to compliance.<\/p>\n<p>Medical device vulnerabilities, such as ones in insulin pumps, defibrillators, mobile cardiac telemetry, pacemakers and intrathecal pain pumps, can be exploited by skilled hackers seeking to interfere with a medical facility\u2019s operations or compromise protected data.<\/p>\n<p>They can also endanger patient health.<\/p>\n<p>&#8220;The healthcare industry needs to appreciate the risks that may exist in the medical device software they use, whether open-source or proprietary. And medical device manufacturers need to acknowledge the potential risks inherent in the products they offer,&#8221; Eracent said.<\/p>\n<p><strong>THE LARGER TREND<\/strong><\/p>\n<p><a data-mce-href=\"https:\/\/www.healthcareitnews.com\/news\/patch-act-seeks-shore-security-medical-devices-iot-networks\" href=\"https:\/\/www.healthcareitnews.com\/news\/patch-act-seeks-shore-security-medical-devices-iot-networks\" target=\"_blank\" rel=\"noopener\">The PATCH Act<\/a>\u00a0initially sought to impose a series of cybersecurity requirements for manufacturers applying for premarket approval through the FDA, but the requirement was dropped in the final bill this past year.<\/p>\n<p>In September, the FBI offered healthcare organizations recommendations\u00a0<a data-mce-href=\"https:\/\/www.healthcareitnews.com\/news\/fbi-spotlights-cybersecurity-risks-outdated-medical-devices\" href=\"https:\/\/www.healthcareitnews.com\/news\/fbi-spotlights-cybersecurity-risks-outdated-medical-devices\" target=\"_blank\" rel=\"noopener\">for addressing cybersecurity vulnerabilities in active medical devices<\/a>.<\/p>\n<p>However, risk analysis is &#8220;<a data-mce-href=\"https:\/\/www.healthcareitnews.com\/news\/how-move-needle-third-party-cybersecurity\" href=\"https:\/\/www.healthcareitnews.com\/news\/how-move-needle-third-party-cybersecurity\" target=\"_blank\" rel=\"noopener\">still a very manual and labor-intensive process<\/a>,&#8221; said Kathy Hughes, CISO of Northwell Health, during a panel on third-party cybersecurity at the December 2022 HIMSS Healthcare Cybersecurity Forum.<\/p>\n<p>Automating the discovery of vulnerabilities presented by medical devices can help minimize cybersecurity breaches that can impact operations and affect patient care is\u00a0<a data-mce-href=\"https:\/\/www.healthcareitnews.com\/news\/roundup-strategies-and-next-steps-improved-cybersecurity-2023\" href=\"https:\/\/www.healthcareitnews.com\/news\/roundup-strategies-and-next-steps-improved-cybersecurity-2023\" target=\"_blank\" rel=\"noopener\">an important strategy for healthcare IT this year<\/a>.<\/p>\n<p><strong>ON THE RECORD<\/strong><\/p>\n<p>&#8220;These new cybersecurity regulations tend to have a cascade effect that may sneak up on some unsuspecting entities in and around the aggregate medical-industrial complex,&#8221; said Szablowski in the announcement. &#8220;We are now offering medical providers and device manufacturers unprecedented free access to our SBOM supply chain risk end-point discovery and end-point analysis software solutions.&#8221;<\/p>\n<p><em>Andrea Fox is senior editor of Healthcare IT News.<br \/>\nEmail:\u00a0<a href=\"http:\/\/www.healthcareitnews.com\/mailto:af**@***ss.org\" data-original-string=\"GYwFiIjeUrtLG1niJaYQlQ==7f4kky43YRXcWCZibfga48a4g==\" title=\"This contact has been encoded by Anti-Spam by CleanTalk. Click to decode. To finish the decoding make sure that JavaScript is enabled in your browser.\" target=\"_blank\" rel=\"noopener\"><span \n                data-original-string='oDUfAfIiqeqTHiJQtJChjA==7f4G1dOY4sZibftmYS4jcO2jQ=='\n                class='apbct-email-encoder'\n                title='This contact has been encoded by Anti-Spam by CleanTalk. Click to decode. To finish the decoding make sure that JavaScript is enabled in your browser.'>af<span class=\"apbct-blur\">**<\/span>@<span class=\"apbct-blur\">***<\/span>ss.org<\/span><\/a><\/em><br \/><em>Healthcare IT News is a HIMSS Media publication.<\/em><\/p>\n<\/div>\n<p><a href=\"https:\/\/www.healthcareitnews.com\/news\/eracent-offers-healthcare-orgs-free-access-sbom-analytics-software\" class=\"button purchase\" rel=\"nofollow noopener\" target=\"_blank\">Read More<\/a><br \/>\n Michele Haslett<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Because it is getting harder to underestimate &#8220;the evil genius of the modern-day cybercriminal,&#8221; Eracent, which develops asset management tools for software and IT, says it will offer healthcare organizations a no-cost tool that can automate the scanning of medical devices&#8217; software bills of materials and match listed components to vulnerability data in its product<\/p>\n","protected":false},"author":1,"featured_media":624379,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[120978,35067,4568],"tags":[],"class_list":{"0":"post-624378","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-eracent","8":"category-heath","9":"category-offers"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/624378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/comments?post=624378"}],"version-history":[{"count":0,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/posts\/624378\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media\/624379"}],"wp:attachment":[{"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/media?parent=624378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/categories?post=624378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newsycanuse.com\/index.php\/wp-json\/wp\/v2\/tags?post=624378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}