The Cybersecurity and Infrastructure Security Agency and FBI Aug. 8 released guidance on secure by design software products which includes resources to assess product security maturity and whether a manufacturer follows secure by design principles.   
  
"As more and more data breaches and life-threatening ransomware attacks are occurring due to hackers exploiting third-party software design vulnerabilities, the solution can no longer be that the purchasers of the flawed software must ‘patch faster,’" said John Riggi, AHA national advisor for cybersecurity and risk. "We agree with the federal government that consumers, including health care organizations, have the ability to drive market forces which produce better securely designed software. At the procurement phase, health care organizations should require that software developers meet the cybersecurity specifications outlined in this guide. Software developers should understand that ‘safety sells,’ not speed to market. Software developers must also take primary responsibility for software security, not the end users — secure by design, and at our insistence — secure by demand."  
  
For more information on this or other cyber and risk issues, contact Riggi at jriggi@aha.org. For the latest cyber and risk resources and threat intelligence, visit aha.org/cybersecurity

Related News Articles

Headline
The Cybersecurity and Infrastructure Security Agency Dec. 11 released an update to its voluntary Cybersecurity Performance Goals, which includes measurable…
Headline
U.S. and international agencies are warning of potential cyberattacks on health care and other critical infrastructure from state-sponsored cyber actors in…
Headline
A critical, unauthenticated remote code execution vulnerability known as React2Shell has been added to the Cybersecurity and Infrastructure Security Agency’s…
Headline
The FBI has public resources available to help prevent exploitation by cybercriminals, who use artificial intelligence for deception. An infographic by the FBI…
Headline
A critical vulnerability has been identified in 7-Zip, a free software program used for archiving data, according to the National Institute of Standards and…
Headline
U.S. and international agencies Nov. 19 released a guide on mitigating potential cybercrimes from bulletproof hosting providers. A BPH provider is an internet…