By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Healthcare security: Combating threats with zero trust – News
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Healthcare security: Combating threats with zero trust – News
News

Healthcare security: Combating threats with zero trust – News

News Room
Last updated: 2025/05/05 at 3:01 AM
News Room Published 5 May 2025
Share
SHARE

Healthcare systems are under attack by cyber threat actors, and it does not appear that there will be relief anytime soon. Nearly 400 healthcare cyberattacks were reported through the first three quarters of 2024 and over 1.2 million patients were affected by data breaches in February of this year alone.

Against this threat backdrop, healthcare organizations such as Main Line Health are relying on technology partners within the cybersecurity community, such as Elisity Inc., to lessen the impact of breaches and protect critical systems.

“There’s a lot of pressure — threat actors are becoming more vicious, targeting health systems in particular, as well as other critical infrastructure,” said Aaron Weismann (pictured, left), chief information security officer at Main Line Health. “They’re doing so because regulatory breaches and patient dignity impacts are revenue drivers for them. Fortunately, our tooling has become more sophisticated. We partner with more vendors who are able to deliver parts of infrastructure that are able to help us reduce the blast radius of an attack, which is absolutely critical to keep patient care going.”

Weismann spoke with theCUBE’s John Furrier at the RSAC 2025 Conference, during an exclusive broadcast on theCUBE, News Media’s livestreaming studio. He was joined by James Winebrenner (right), chief executive officer of Elisity, and they discussed challenges and solutions for protecting the healthcare industry. (* Disclosure below.)

Least privilege access for healthcare

For technology companies such as Elisity, part of the challenge in working with healthcare organizations to secure systems is that patient care environments can be very complex. Along with managed desktop, laptop and wireless devices, there is a significant amount of IoT connectivity.

Aaron Weismann, CISO at Main Line Health, and James Winebrenner, CEO at Elisity, talk with theCUBE about healthcare during RSAC.

“It’s being able to identify those different classes of systems and then be able to not just segment them for segmentation’s sake, but really move them towards a true least privilege access model,” Winebrenner said. “Does the MRI machine need to talk to the IP video camera that’s on the fifth floor? The answer is no … it needs to be able to talk to the patient monitoring system.”

To deal with this level of complexity in healthcare environments, Elisity focuses on providing visibility into a tangled web of connected devices and crafting policies for least privilege access and zero trust. This allows organizations such as Main Line Health to make informed decisions around device segmentation while maintaining the right context for effective patient care.

“We built a software-defined control plane that we can extend out into existing infrastructure, gather metadata about what’s communicating, marry that up with other sources of identity and context that are in the customer’s environment,” Winebrenner said. “We give customers a holistic view of all of those assets and then allow them to build policy based on the identity and context, not the underlying network construct.”

Both Weismann and Winebrenner have come to appreciate the importance of delivering technology solutions in patient healthcare today. Clinical operations staff want to be involved because they understand the vital role that cybersecurity can play in the ongoing delivery of patient care.

“One of the biggest takeaways is that clinical operations actually loves helping technology design,” Weismann said. “It turns out they care very greatly about the technology support on their patient care. If you start introducing these concepts and communicating in a clinically relevant way, you’re going to be able to get really solid buy-in from your clinical operators. That’s transferable to any industry.

Here’s the complete video interview, part of News’s and theCUBE’s coverage of the RSAC 2025 Conference event:

(* Disclosure: Elisity Inc. sponsored this segment of theCUBE. Neither Elisity nor other sponsors have editorial control over content on theCUBE or News.)

Photo: News

Your vote of support is important to us and it helps us keep the content FREE.

One click below supports our mission to provide free, deep, and relevant content.  

Join our community on YouTube

Join the community that includes more than 15,000 #CubeAlumni experts, including Amazon.com CEO Andy Jassy, Dell Technologies founder and CEO Michael Dell, Intel CEO Pat Gelsinger, and many more luminaries and experts.

“TheCUBE is an important partner to the industry. You guys really are a part of our events and we really appreciate you coming and I know people appreciate the content you create as well” – Andy Jassy

THANK YOU

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Android 16 could introduce an Intrusion Detection feature (APK teardown)
Next Article Golden Chickens Deploy TerraStealerV2 to Steal Browser Credentials and Crypto Wallet Data
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Grim execution of Medieval woman revealed as brutal punishment was a ‘warning’
News
Microsoft OneDrive File Picker Flaw Grants Apps Full Cloud Access — Even When Uploading Just One File
Computing
Urgent call for 1,000,000 blood donors to help NHS avoid ‘red alert’
News
The Performance Gains Brought By Linux 6.15+ & Mesa 25.2 For AMD Strix Halo
Computing

You Might also Like

News

Grim execution of Medieval woman revealed as brutal punishment was a ‘warning’

5 Min Read
News

Urgent call for 1,000,000 blood donors to help NHS avoid ‘red alert’

6 Min Read
News

macOS 26 rumor roundup: what to expect for the Mac at WWDC 2025

14 Min Read
News

Black Ops 7 Dives Back Into the Shadows With Mason and Menendez

3 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?