Most of the code running in your product probably isn't code you wrote. Open source libraries, vendor SDKs, and firmware components all become part of your attack surface the moment they're compiled into your build. Third-party software risk is the potential for...
Download RunSafe’s 2025 Medical Device Cybersecurity Index
Industry-defining insights from 605 healthcare decision-makers on medical device cybersecurity
Medical device cybersecurity has evolved from an IT concern to a patient safety imperative. Our comprehensive survey of 605 healthcare executives reveals how cyberattacks on medical devices are reshaping procurement decisions, budget priorities, and patient care across the healthcare ecosystem.
Key Findings At-a-Glance:
- 22% of healthcare organizations have experienced cyberattacks on medical devices
- 75% of these incidents affected patient care
- 46% have declined device purchases due to cybersecurity concerns
- 79% are willing to pay premium prices for devices with advanced security
- 35% now identify medical devices as their biggest cybersecurity concern
What’s Inside the Report:
- Real-world examples of how cyber incidents are affecting patient care
- How security is changing procurement and vendor expectations
- Where healthcare budgets are shifting—and why
- What healthcare buyers now demand from medical device manufacturers
- What forward-thinking leaders can do to stay ahead
Who Should Read This Report:
- Healthcare executives and decision-makers
- Medical device manufacturers and vendors
- Healthcare IT and security professionals
- Healthcare procurement professionals
- Healthcare investors and analysts
Check Out Our Latest Blog Posts
The Worst Vulnerabilities of 2025: How Pre-Auth RCE Broke the Perimeter
Across industries, the year’s most damaging vulnerabilities shared the same defining trait: unauthenticated remote code execution (pre-auth RCE) on internet-facing systems. VPNs, firewalls, web frameworks, and even core ERP platforms all fell victim to flaws that...
3 SBOM Generation Methods: Binary vs Build-Time vs Source Code
Your SBOM is only as useful as it is accurate, and the method you use for Software Bill of Materials (SBOM) generation determines the level of accuracy you will receive. SBOM generation method determines whether an SBOM captures what developers declared, what scanners...



