Healthcare & Pharmaceutical

We help many of the world’s largest healthcare and pharmaceutical organizations manage their digital risk.

  • Top Cyber Threats to the Healthcare & Pharmaceutical Sector

    Top Cyber Threats to the Healthcare & Pharmaceutical Sector

    There is no shortage of cyber threats against the lucrative health care, medical device and pharmaceutical sectors. Discover the top cyber threats to these industries.

    Read Report
  • ×

    Live Webinar on
    April 8th:

    Operationalizing Alerts: The Problem with Sitting in Triage

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2020Apr08 - Operationalizing Alerts
    Thank you!
    Error - something went wrong!
  • Social Media Oversharing by Healthcare Executive Puts Firm at Risk

    Social Media Oversharing by Healthcare Executive Puts Firm at Risk

    Digital Shadows helped a healthcare organization discover that one of its technical executives had included specific system, server models, and software versions on a career biography posted online.

    Read Report
  • Eliminating Third Party Cyber Risks from Healthcare Delivery57:15

    Eliminating Third Party Cyber Risks from Healthcare Delivery

    Hear from Associate Director Suzanne Schwartz from the Food and Drug Administration and Digital Shadows for an informative session on best practices for eliminating third party risks.

    Watch Video
  • Digital Risk Protection: Forrester New Wave Report

    Digital Risk Protection: Forrester New Wave Report

    Digital Shadows Named a "Leader" in 2018 Forrester New Wave for Digital Risk Protection

    Read Report
  • Weekly Intelligence Summary 17 Jan 2020

    Weekly Intelligence Summary 17 Jan 2020

    The cyber-extortion landscape has shown real signs of strength and advancement in the past three months...

    Read Report
  • Discover why we’re named a "Leader" in Digital Risk Protection

    Forrester Report
  • NSA Vulnerability Disclosure, Ransomware News, And Iran Updates

    NSA Vulnerability Disclosure, Ransomware News, And Iran Updates

    Kacey, Charles, Alex, and Harrison host this week’s threat intelligence update from Dallas. We kick off with vulnerabilities from the week. This includes both the NSA CVE and Citrix CVE. The team...

    Read Post
  • ×

    Threat Intel Fan?

    Sign up below to get our TI updates delivered to your inbox!

    First Name
    Last Name
    Company
    Country
    State- optional
    Job Title
    Thank you!
    Error - something went wrong!
  • Third Party Risk: 4 ways to manage your security ecosystem

    Third Party Risk: 4 ways to manage your security ecosystem

      The digital economy has multiplied the number of suppliers that organizations work and interact with. Using a supplier can ...

    Read Post
  • 2020 Cybersecurity Forecasts: 5 trends and predictions for the new year

    2020 Cybersecurity Forecasts: 5 trends and predictions for the new year

    In this blog, we discuss several significant trends and events that have helped shape the cyber threat landscape, all of which will almost certainly continue through 2020.

    Read Post
  • Tochka Dark Web Market Offline, Market.ms Closes, And Data Leakage Stories

    Tochka Dark Web Market Offline, Market.ms Closes, And Data Leakage Stories

    Alex, Harrison, Kacey, and Charles chat this week on some dark web and cybercriminal updates, data leakage stories that have hit the news, plus a GDPR story where an ISP was hit with a €9.6...

    Read Post
  • Threat Intelligence: A Deep Dive

    Threat Intelligence: A Deep Dive

      Welcome to our deep dive on threat intelligence: intended to help security professionals embarking on creating and building a ...

    Read Post
  • ×

    Request a
    Live Demo

    First Name
    Last Name
    Company
    Phone Number
    Country
    State
    Job Title
    Thank You
    Error - something went wrong!
  • Forums are Forever – Part 1: Cybercrime Never Dies

    Forums are Forever – Part 1: Cybercrime Never Dies

    The survival of the cybercriminal forum in the face of new, more secure technologies and constant pressure from law enforcement does not come as a surprise to researchers at Digital Shadows.

    Read Post
  • Forums are Forever – Part 2: Shaken, but not Stirred

    Forums are Forever – Part 2: Shaken, but not Stirred

    Part 2 looks at cybercriminal forum users’ resistance to moving away from the forum model.

    Read Post
  • A Threat Intelligence Analyst’s Guide to Today’s Sources of Bias

    A Threat Intelligence Analyst’s Guide to Today’s Sources of Bias

    This blog seeks to rebalance intelligence tradecraft discussions by highlighting some of the less glamorous everyday sources of bias that are too often overlooked.

    Read Post
  • A Practical Guide to Reducing Digital Risk

    A Practical Guide to Reducing Digital Risk

    This practical guide provides advice to help understand how to identify critical business assets, understand the threat, monitor for exposure, and take action.

    Read Report
  • Probiv: The missing pieces to a cybercriminal’s puzzle

    Probiv: The missing pieces to a cybercriminal’s puzzle

    in the cybercriminal underground, there’s a service (and even a dedicated platform) that enables anyone to obtain sensitive information via insiders: Probiv.

    Read Post
  • SecDevOps: Continued Database Exposures Point to Growing Challenges

    SecDevOps: Continued Database Exposures Point to Growing Challenges

    Last week, we learned that millions of Ecuadorian’s personal details had been exposed by a misconfigured ElasticSearch database. This is ...

    Read Post
  • Cybercriminal credit card stores: Is Brian out of the club?

    Cybercriminal credit card stores: Is Brian out of the club?

    In this blog, we determine whether this targeted attack on BriansClub will impact the wider cybercriminal credit carding landscape, and speculate whether it could galvanize the community to push anoth

    Read Post
  • Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground

    Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground

    we detected over 550 typosquats for the 34 candidate- and election-related domains we gathered from open-source research. Not every single one was something interesting; most of the time the typosquat

    Read Post
  • Too Much Information: The Sequel | New Research

    Too Much Information: The Sequel | New Research

    There are now 750 million more files exposed than we reported last year; not all of them are blatantly sensitive, but there is plenty of gold in these mountains.

    Read Report
  • Domain Squatting: The Phisher-man’s Friend

    Domain Squatting: The Phisher-man’s Friend

    Simon talks about how easy it is to conduct domain squatting and typosquatting, and how little monitoring still goes on around them in the industry.

    Read Post
  • loading
    Loading More...