<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Tala Secure]]></title><description><![CDATA[Tala Secure]]></description><link>https://www.talasecure.com/blog</link><generator>RSS for Node</generator><lastBuildDate>Sat, 11 Apr 2026 02:28:58 GMT</lastBuildDate><atom:link href="https://www.talasecure.com/blog-feed.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[Stryker: Cyber Clarity Signal News...]]></title><link>https://www.talasecure.com/post/cyber-clarity-signal-news</link><guid isPermaLink="false">69d6c93f89f9e676eca1f08d</guid><pubDate>Wed, 08 Apr 2026 21:35:25 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/fb6cc9_268fc2f29e03438599189d64d7412067~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rajesh Kanungo</dc:creator></item><item><title><![CDATA[FDA QMSR Surprise: Cybersecurity Just Moved Into the QMS]]></title><description><![CDATA[The quick version for busy people: FDA now aligns with ISO 13485. One global quality system. Nice. Cybersecurity is now clearly part of the QMS. Engineering and quality are about to spend more time together. Threat modeling, vulnerability management, and updates now live inside documented quality processes. Not just engineering notes anymore. You may need to buy ISO 13485 to read it. Regulatory harmonization apparently includes a shopping step. So What Actually Changed? The FDA’s new Quality...]]></description><link>https://www.talasecure.com/post/fda-qmsr-surprise-cybersecurity-just-moved-into-the-qms</link><guid isPermaLink="false">69b07c30709b661fe633de73</guid><pubDate>Tue, 10 Mar 2026 20:23:03 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/fb6cc9_073ee8a4a33c45c0a934a09615f20159~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rajesh Kanungo</dc:creator></item><item><title><![CDATA[Firmware Security Playbook for MedTech Manufacturers]]></title><description><![CDATA[Medical device manufacturers already operate under intense pressure to meet safety, quality, and regulatory requirements. Cybersecurity adds another layer of responsibility, especially when it comes to firmware updates. Hospitals rely almost entirely on manufacturers to keep devices secure, and doing this well requires clear guidance, predictable processes, and practical tools. This playbook is meant to help. It outlines why firmware security has become a manufacturer's responsibility, the...]]></description><link>https://www.talasecure.com/post/firmware-security-playbook-for-medtech-manufacturers</link><guid isPermaLink="false">694218071879721f43390e55</guid><pubDate>Wed, 17 Dec 2025 02:46:21 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/fb6cc9_17ccfadd01274e58b1eba2f6cd041de6~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rajesh Kanungo</dc:creator></item><item><title><![CDATA[10 Ways to Gain Hospital Trust Through Device Security]]></title><description><![CDATA[Why Device Security Must Be a Manufacturer Priority Today’s medical devices are tightly connected to hospital networks, clinical systems, cloud platforms, and remote support tools. This improves patient care, but it also opens the door to cyber threats. If your device has a vulnerability, hospitals expect you to take the lead. One unpatched or misconfigured device can cause: Workflow disruptions and clinical downtime Delayed diagnoses or treatments Exposed patient data Hospital-wide incident...]]></description><link>https://www.talasecure.com/post/10-ways-to-gain-hospital-trust-through-device-security</link><guid isPermaLink="false">693a73e61c4b299a0da04c84</guid><pubDate>Thu, 11 Dec 2025 07:36:13 GMT</pubDate><dc:creator>Rajesh Kanungo</dc:creator></item><item><title><![CDATA[Managing Cybersecurity as a CAPA Event: 5 Steps to Handle Risks Effectively]]></title><description><![CDATA[Cybersecurity incidents are increasingly recognised as quality and compliance events that can affect the entire organisation, rather than being limited to the IT department. Because a single vulnerability could disrupt operations, compromise product integrity, or lead to regulatory noncompliance, cybersecurity issues must be handled with the same rigor as other CAPA events. When an organisation combines cybersecurity risk management (AAMI TIR57:2016 (R2023)) with safety and operational risk...]]></description><link>https://www.talasecure.com/post/managing-cybersecurity-as-a-capa-event-5-steps-to-handle-risks-effectively</link><guid isPermaLink="false">692589c914a85b5f4542f7ea</guid><pubDate>Tue, 25 Nov 2025 10:52:57 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/fb6cc9_7fbe87bd6ae34e5fb5635ec061fa9c32~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rajesh Kanungo</dc:creator></item><item><title><![CDATA[Top 10 Holiday Cybersecurity Risks and How to Stay Safe]]></title><description><![CDATA[The holiday season brings an extra level of excitement, with some free time to enjoy and relax, so it's no wonder many consider it one of the busiest times of the year. It often brings increased online activity, from shopping and banking to coordinating travel and sharing with friends and family. Cybercriminals know this fact and use it to take advantage of the busy season.  Cybercriminals use the holiday season to target individuals and organizations through scams, phishing attempts, and...]]></description><link>https://www.talasecure.com/post/top-10-holiday-cybersecurity-risks-and-how-to-stay-safe</link><guid isPermaLink="false">691ce7cb7ab4cbbab13c909d</guid><pubDate>Tue, 18 Nov 2025 21:41:26 GMT</pubDate><dc:creator>Rajesh Kanungo</dc:creator></item><item><title><![CDATA[After the Breach: Rebuilding Trust and Resilience in Medical Devices]]></title><description><![CDATA[A 10 Point Framework for Responding to a Breach Connected medical devices have transformed patient care, but with connectivity comes exposure. Cyberattacks on medical device manufacturers now pose not only data privacy risks but also patient safety and regulatory consequences. When a breach occurs, the damage extends far beyond compromised systems. It strikes at the heart of what matters most: trust. Rebuilding that trust requires swift, transparent, and disciplined action grounded in both...]]></description><link>https://www.talasecure.com/post/after-the-breach-rebuilding-trust-and-resilience-in-medtech</link><guid isPermaLink="false">68fa688ddc39b5e10ea84d3b</guid><pubDate>Thu, 23 Oct 2025 17:57:12 GMT</pubDate><dc:creator>Rajesh Kanungo</dc:creator></item><item><title><![CDATA[Rebuilding Patient Trust After a Data Breach in a Rural Hospital]]></title><description><![CDATA[10 Key Actions Every Rural Hospital Can Take A cyberattack at a rural hospital doesn’t just shut down systems;  it shakes the very foundation of trust that keeps your community coming through your doors. In towns where patients know their nurses, doctors, and front-desk staff by name , a data breach feels deeply personal. It’s not just information that’s been exposed; it’s a relationship that’s been damaged. According to the National Rural Health Association, 60% of rural hospitals have faced...]]></description><link>https://www.talasecure.com/post/rebuilding-patient-trust-after-a-data-breach-in-a-rural-hospital</link><guid isPermaLink="false">68e77723f99b368a71d78de4</guid><pubDate>Thu, 09 Oct 2025 09:42:48 GMT</pubDate><dc:creator>Rajesh Kanungo</dc:creator></item><item><title><![CDATA[Legacy Medical Devices: Tackling Cybersecurity Concerns]]></title><description><![CDATA[Under the FDA’s updated rules (Section 524B of the FD&#38;C Act), any medical device that includes software, connects to a network, or could...]]></description><link>https://www.talasecure.com/post/legacy-medical-device-sales-tackling-cybersecurity-concerns</link><guid isPermaLink="false">68ca413b1ce12776d6eca82d</guid><pubDate>Wed, 17 Sep 2025 05:34:19 GMT</pubDate><dc:creator>Rajesh Kanungo</dc:creator></item><item><title><![CDATA[Legacy Systems and Cybersecurity: What Rural Hospitals Need to Do]]></title><description><![CDATA[In today’s rapidly evolving healthcare landscape, legacy systems in rural healthcare systems are still common. A 2021 Healthcare...]]></description><link>https://www.talasecure.com/post/securing-legacy-healthcare-systems-and-devices</link><guid isPermaLink="false">68c104b640e2d7ce3e7a1a0f</guid><pubDate>Wed, 10 Sep 2025 05:03:45 GMT</pubDate><dc:creator>Rajesh Kanungo</dc:creator></item><item><title><![CDATA[How to Protect Your Medical Devices and Your Business in 2025]]></title><description><![CDATA[Cybersecurity is no longer optional for medical device companies. New FDA requirements, tougher hospital IT standards, and rising cyber...]]></description><link>https://www.talasecure.com/post/how-to-protect-your-devices-and-your-business-in-2025</link><guid isPermaLink="false">689b9fa81b954e09d4d92713</guid><pubDate>Tue, 12 Aug 2025 20:24:42 GMT</pubDate><dc:creator>Rajesh Kanungo</dc:creator></item><item><title><![CDATA[2025 Cyber Updates: FDA 2025 Cybersecurity Update for Medical Device Manufacturers]]></title><description><![CDATA[The FDA released a revised guidance titled “ Cybersecurity in Medical Devices: Quality System Considerations and Content of Premarket...]]></description><link>https://www.talasecure.com/post/2025-cyber-updates-fda-2025-cybersecurity-update-for-medical-device-manufacturers</link><guid isPermaLink="false">6893bd6bfa7c833bf0259229</guid><pubDate>Wed, 06 Aug 2025 20:51:26 GMT</pubDate><dc:creator>Rajesh Kanungo</dc:creator></item><item><title><![CDATA[Stretching Every Dollar: Smart Strategies for Rural Hospitals]]></title><description><![CDATA[Rural hospitals are the backbone of healthcare in underserved communities, delivering everything from primary to long-term care for over...]]></description><link>https://www.talasecure.com/post/stretching-every-dollar-smart-strategies-for-rural-hospitals</link><guid isPermaLink="false">68914b84e70127e5cb681b7d</guid><pubDate>Tue, 05 Aug 2025 00:08:48 GMT</pubDate><dc:creator>Rajesh Kanungo</dc:creator></item><item><title><![CDATA[Securing an AI System - Tutorial - Part 1]]></title><description><![CDATA[Methods to defend against data poisoning attacks Saurabh Malpure (TalaSecure, Inc.) Rajesh Kanungo  (TalaSecure, Inc.) Jaime Burks (UCSD)...]]></description><link>https://www.talasecure.com/post/securing-an-ai-system-tutorial-part-1-1</link><guid isPermaLink="false">684f9599a149197afa70e1b6</guid><pubDate>Wed, 21 Aug 2024 17:26:25 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/fb6cc9_6b1db04fe50f461c94602a92943a6803~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rajesh Kanungo</dc:creator></item><item><title><![CDATA[GenAI Security Challenges and Solutions]]></title><description><![CDATA[Rajesh Kanungo (CEO, TalaSecure, Inc.) Tejpal Chadha (CEO, MyAiDr.ai) Executive Summary Investment in Artificial Intelligence (AI) and...]]></description><link>https://www.talasecure.com/post/genai-security-challenges-and-solutions</link><guid isPermaLink="false">684f9599a149197afa70e1c4</guid><pubDate>Mon, 22 Jul 2024 09:17:28 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/3c83e4_cf9c500dff264fe0bd7d0fcc804000e0~mv2.png/v1/fit/w_1000,h_812,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rajesh Kanungo</dc:creator></item><item><title><![CDATA[512,000 Radiology patients' data stolen]]></title><description><![CDATA[Executive Summary Consulting Radiologists LTD. (“CRL”) reported that cybercriminals may have stolen the data of roughly 512,000 patients....]]></description><link>https://www.talasecure.com/post/512-000-radiology-patients-data-stolen</link><guid isPermaLink="false">684f9599a149197afa70e1bc</guid><pubDate>Fri, 21 Jun 2024 21:34:27 GMT</pubDate><dc:creator>Rajesh Kanungo</dc:creator></item><item><title><![CDATA[ARM Memory Security Broken]]></title><description><![CDATA[Executive Summary A team from South Korea, Juhee Kim, Youngjoo Lee, Jinbum Park, Taesoo Kim, Sihyeon Ro, Jaeyoung Chung, and Byoungyoung...]]></description><link>https://www.talasecure.com/post/arm-memory-security-broken</link><guid isPermaLink="false">684f9599a149197afa70e1bf</guid><pubDate>Tue, 18 Jun 2024 17:02:54 GMT</pubDate><dc:creator>Rajesh Kanungo</dc:creator></item><item><title><![CDATA[Risk Management, Data Loss Prevention and everything around it…]]></title><description><![CDATA[The first in a series of blog posts about how Security Risk and Data Loss Prevention are related.  ]]></description><link>https://www.talasecure.com/post/risk-management-data-loss-prevention-and-everything-around-it</link><guid isPermaLink="false">684f9598a149197afa70e1b3</guid><pubDate>Sun, 18 Sep 2022 01:37:44 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/fb6cc9_1a0357565bdb4c7d87aac78eb721656c~mv2.jpg/v1/fit/w_904,h_654,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rajesh Kanungo</dc:creator></item><item><title><![CDATA[Cryptocurrency: the US tries to legitimize it]]></title><description><![CDATA[The latest White House development in cryptocurrencies,  Executive Order (EO)on Ensuring Responsible Development of Digital Assets, is...]]></description><link>https://www.talasecure.com/post/cryptocurrency-the-us-tries-to-legitimize-it</link><guid isPermaLink="false">684f9599a149197afa70e1b9</guid><pubDate>Wed, 09 Mar 2022 22:20:57 GMT</pubDate><dc:creator>Rajesh Kanungo</dc:creator></item><item><title><![CDATA[Ransomware: how to estimate the Risk]]></title><description><![CDATA[Why is it so hard to estimate cybersecurity, especially ransomware risk? Why is it that ransomware attacks have an outsized impact on an...]]></description><link>https://www.talasecure.com/post/ransomware-how-to-estimate-the-risk</link><guid isPermaLink="false">684f9599a149197afa70e1c3</guid><pubDate>Mon, 21 Feb 2022 20:33:59 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/fb6cc9_818cc930611146f780054eb18ace7f06~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rajesh Kanungo</dc:creator></item></channel></rss>