This document contains a framework for improving the safety and reliability of software and firmware in medical devices by using fuzzing. Fuzzing is a testing technique for locating unknown vulnerabilities and other defects by sending malformed and unexpected inputs to software.
(Tuesday, June 26, 2012)
MDISS Executive Director, Dr. Dale Nordenberg will be a featured speaker at this event. The Partnerships in Medical Device Trials Conference, is an extension of the Partnerships brand, and will take place June 2-4, 2014 in Chicago, IL
(Monday , June 02, 2014)
MDISS encourages you to attend mHealth Summit! Please join MDISS for the two panels that we will be presenting at mHIMSS this year:
(Friday , October 04, 2013)
OULU, FINLAND and SARATOGA, CA, USA, June 26, 2012 -- Codenomicon, the leading vendor of proactive security testing software, has joined the Medical Device Innovation, Safety and Security Consortium (MDISS) to enhance the security in solutions and devices in the healthcare industry.
(Tuesday , June 26, 2012)
CHICAGO (February 16, 2012) - The Healthcare Information and Management Systems Society (HIMSS) announced today that the 2012 mHealth Summit will take place Dec. 3 -5 at the Gaylord National Resort and Convention Center in Washington D.C.
(Sunday , February 12, 2012)
As it happens, it appears that the smallish contract awarded to Cerner to replace the Military Health System's anatomic pathology lab technology earlier this month was a hint, after all.
It might seem like a bit of Monday morning quarterbacking, but industry insiders are weighing in on the $9B contract the Department of Defense signed with EHR giant Cerner, and some are suggesting the government could have finessed a better play.&nbs
The dangers of data breach make for great headlines: data held for ransom, financial fraud, and medical identity theft, to name a few. But despite the many risks of data breach, from a business standpoint, the most immediate threat in most security incidents is failure to comply with regulatory requirements. The vast majority of security incidents don't turn into data breaches, and not all breaches result in theft or other damages. But failure to report or meet other regulatory requirements can result in stiff penalties regardless.