May 27, 2020

As Healthcare Industry Transforms Overnight, Tech Community Must Act

1 min. read

Today everyone is in Agile mode, but no one more so than the overburdened healthcare industry.

We have seen images of doctors and nurses on the front lines, but there are heroic efforts happening behind the scenes too as hospitals and health systems innovate at warp speed to solve new logistical and data challenges. We are watching an entire industry undergo a decade of digital transformation in a matter of months.

What is happening during this crisis will not just change the landscape in healthcare today—it will change the way that we deliver and experience healthcare forever. The impact will be felt for years if not decades.

So it’s imperative that the technology industry come together to help healthcare meet this challenge, both to support the healthcare system when it’s needed most, as well as to ensure that new digital infrastructure is implemented the best possible way.

Given the situation, it is almost certain that we are generating a massive risk exposure. One risk to a single link in an application’s chain of custody has the potential to allow exploitation of the entire system. Even in a crisis, there will absolutely be people eager to exploit those risks for any number of reasons.

Read the full article published May 6, 2020 here: by SecurityWeek.

Join the Discussion


Expertly picked stories on threat intelligence

Hundreds of apps will be attacked by the time you read this.

So, we get to work. We obsess over effective attack methods. We monitor the growth of IoT and its evolving threats. We dive deep into the latest crypto-mining campaigns. We analyze banking Trojan targets. We dissect exploits. We hunt for the latest malware. And then our team of experts share it all with you. For more than 20 years, F5 has been leading the app delivery space. With our experience, we are passionate about educating the security community-providing the intel you need to stay informed so your apps can stay safe.


9 hrs

a critical vulnerability—with the potential for remote code execution—is released.