Healthcare & Pharmaceutical

We help many of the world’s largest healthcare and pharmaceutical organizations manage their digital risk.

  • Top Cyber Threats to the Healthcare & Pharmaceutical Sector

    Top Cyber Threats to the Healthcare & Pharmaceutical Sector

    There is no shortage of cyber threats against the lucrative health care, medical device and pharmaceutical sectors. Discover the top cyber threats to these industries.

    Read Report
  • ×

    Live Webinar on
    April 9th:

    Cyber Threats and The Shifting Regulatory Landscape

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2019 April - Cyber Threats and Regulatory Landscape Webinar
    Thank you!
    Error - something went wrong!
  • ×

    Live Webinar
    March 27:

    How to Reduce Your Extortion Risks

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2019 March - Extortion Webinar
    Thank you!
    Error - something went wrong!
  • A Practical Guide to Reducing Digital Risk

    A Practical Guide to Reducing Digital Risk

    This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.

    Read Report
  • SingHealth Breach Post-mortem: Key Findings

    SingHealth Breach Post-mortem: Key Findings

    On 10 January 2019, Singaporean authorities finally released a report detailing how the attack against Singapore’s largest group of healthcare ...

    Read Post
  • Eliminating Third Party Cyber Risks from Healthcare Delivery57:15

    Eliminating Third Party Cyber Risks from Healthcare Delivery

    Hear from Associate Director Suzanne Schwartz from the Food and Drug Administration and Digital Shadows for an informative session on best practices for eliminating third party risks.

    Watch Video
  • Weekly Intelligence Summary 14 Feb - 21 Feb 2019

    Weekly Intelligence Summary 14 Feb - 21 Feb 2019

    Highlights from the week include: A new financially motivated threat actor advertised up to 841 million data records for sale on Dream Market; “APT-C-36” has targeted multiple Colombian sectors, inclu

    Read Report
  • Read Full Report
  • A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure

    A Tale of Epic Extortions - How Cybercriminals Monetize Our Online Exposure

    Digital Shadows’ Photon Research Team has found that cybercriminals have diversified their extortion methods, and the threat landscape is as wide and varied as it’s ever been.

    Read Report
  • ×

    Join 150k subscribers and get the latest news & threat intel in your inbox.

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Digital Risk: The C-Suite's Critical Missing Part of Overall Risk

    Digital Risk: The C-Suite's Critical Missing Part of Overall Risk

    In this report, you will learn the emergence of Digital Risk Protection, a framework for protecting against Digital Risks, questions the C-Suite should be asking.

    Read Report
  • Episode 18: Healthcare hacking, BGP hijacking, crypto jacking, and more

    Episode 18: Healthcare hacking, BGP hijacking, crypto jacking, and more

    In this week’s episode of Shadow Talk, we cover the targeting of healthcare organizations by Orangeworm, BGP hijacking, vulnerabilities in MikroTik routers, DDoS market shutdowns, and the...

    Read Post
  • Digital Risk Protection 2018 Forrester New Wave

    Digital Risk Protection 2018 Forrester New Wave

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar50:49

    FBI Cyber Squad: Surging Cyber Threats to Watch in 2019 - Recorded Webinar

    Hear firsthand from FBI Cyber Squad Supervisory Special Agent, Elvis Chan on the cyber threats that you’re most likely to encounter in 2019. You’ll also hear from Harrison Van Riper on cyber threat tr

    Watch Video
  • ×

    Request a
    Live Demo

    First Name
    Last Name
    Company
    Phone Number
    Country
    State
    Job Title
    Thank You
    Error - something went wrong!
  • How ADP Manages 3rd Party & Supply Chain Risk57:25

    How ADP Manages 3rd Party & Supply Chain Risk

    Recorded webcast with Guest Speaker V.Jay LaRosa from ADP discussing best practices mitigating cyber risks from complex service delivery ecosystems.

    Watch Video
  • Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It

    Tackling Phishing: The Most Popular Phishing Techniques and What You Can Do About It

    We cover a range of the different techniques attackers of all persuasions (whether sophisticated nation state or low-level hacker) choose when performing their phishing campaigns.

    Read Post
  • Episode 57: Singapore Healthcare Breach

    Episode 57: Singapore Healthcare Breach

    For this week’s ShadowTalk deep dive, we called in Doctor Richard Gold to discuss the major healthcare breach affecting SingHealth, Singapore’s largest group of healthcare organizations.

    Read Post
  • 2019 Cyber Security Forecasts: Six Things on the Horizon

    2019 Cyber Security Forecasts: Six Things on the Horizon

    For this blog, we looked at trends and events that have shaped the digital risk landscape this year and how they might play out in 2019.

    Read Post
  • Mitigating the Top 7 Dark Web Threats to Your Enterprise59:01

    Mitigating the Top 7 Dark Web Threats to Your Enterprise

    The dark web continues to pose extremely dangerous threats as cyber criminals coordinate attacks and trade intelligence about your enterprise. Join us for us for an informative session on the 7 most p

    Watch Video
  • Weekly Intelligence Summary: Ep 1

    Weekly Intelligence Summary: Ep 1

    Our main story involves the leak of personal information from several German political parties. We also discuss the other big threat intelligence stories from the week and find out...

    Read Post
  • How to Leverage Threat Intelligence to Protect Against Digital Risks30:01

    How to Leverage Threat Intelligence to Protect Against Digital Risks

    Hear from Neal Humphrey of ThreatQuotient and Brian Roy of Digital Shadows who will explain how to use tailored threat intelligence from the open, deep, and dark web to identify risks, gain context ab

    Watch Video
  • Infographic: Mapping the ASD Essential 8 to the Mitre ATTCK framework

    Infographic: Mapping the ASD Essential 8 to the Mitre ATTCK framework

    We took our recent work on the Mitre ATT&CK framework and various indictments of cyber criminals and nation state actors and mapped them to the Essential 8 framework.

    Read Report
  • Episode 55: Tackling Phishing

    Episode 55: Tackling Phishing

    Simon Hall and Richard Gold join Rafael Amado to wade in on the topic of phishing. By looking at details revealed in law enforcement indictments against nation state and organized criminal groups,...

    Read Post
  • Cybercriminals on the Outlook for Your Emails

    Cybercriminals on the Outlook for Your Emails

    In this research, Digital Shadows outlines the declining barriers to entry for this type of fraud. Check out our key findings.

    Read Report
  • loading
    Loading More...