<h1>Lucas Catranis</h1>

Lucas Catranis

Lucas Catranis is the Director of Connected Health Solutions at Irdeto. His responsibilities include overall product management of Irdeto’s connected health portfolio as well strategic relationship management. Lucas joined Irdeto in 2013 as a Sr. Engineer tasked with building Irdeto’s Service Operations Capabilities and then moved into a product management role in the Cybersecurity services team in 2015. In 2018, Lucas took on the role of the Chief of Staff to the Irdeto senior leadership team, where he worked cross-functionally to assist the various business leaders with the development of Irdeto’s long term strategy and business plans.
Exposing medical devices: Alarming statistics in the last 3 years

Exposing medical devices: Alarming statistics in the last 3 years

Moving away from static offline devices and paper notetaking, to having the full system and communication done online was a breakthrough for the healthcare industry. This however introduced new challenges for medical device cybersecurity. This article explores some of the most alarming statistics on how the industry has been affected by cybersecurity threats over the past few years. 

MedTech Cybersecurity: Top 10 most confusing buzzwords

MedTech Cybersecurity: Top 10 most confusing buzzwords

The landscape of cybersecurity is crowded with buzzwords – sometimes to the point of confusion. While simply avoiding them is one way to go about it, understanding them will go a long way if you want to protect your healthcare organization and medical devices from potential cyberattacks. In this article, the most used terms have been broken down, so the next time you encounter them, you can avoid confusion!

SBOM and VEX help you complete your medical device security risk assessment with ease 

SBOM and VEX help you complete your medical device security risk assessment with ease 

Software Bill of Materials (SBOM) and Vulnerability Exploitability eXchange (VEX) are becoming essential components of medical device cybersecurity. The effectiveness of medical device security practice, however, can be challenging to accomplish without first understanding how VEX complements an SBOM throughout the product lifecycle. Let’s explore how to make the best use of these two concepts in this article.

Medical devices and how hackers target them

Medical devices and how hackers target them

With the rise of the Internet of Medical Things (IoMT), medical devices are becoming increasingly more prominent in the healthcare industry. This, however, does not come without its risks. Hackers are using medical devices to springboard deeper into medical system networks. This article explores the motives as well as the methods used to access medical devices.

How can Public Key Infrastructure (PKI) strengthen your medical device cybersecurity?  

How can Public Key Infrastructure (PKI) strengthen your medical device cybersecurity?  

To secure against potential cybersecurity vulnerabilities, Medical Device Manufacturers (MDMs) should enroll their medical devices into a Public Key Infrastructure (PKI), a trusted and widely used cryptographic practice that ensures operational safety. Learn more about securing your medical device with a PKI from our free e-book: “Why should Medical Device Manufacturers (MDMs) secure their devices with a Public Key Infrastructure (PKI)?”

WordPress PopUp Plugin