Cybersecurity

Page: 2

You’ve Been Cloned Have you had the misfortune of finding an account that has duplicated your life and details and set up as if they are you – if not I’m going to suggest it’s just a matter of time. I have, multiple times and it’s not pleasant and hard to stop – there is […]

Read

Saving Healthcare Quality This week I am talking to Fred Trotter (@fredtrotter), CTO CareSet Systems – the first commercial Medicare Data company. Fred has a long and fascinating background that unlike many healthcare Cybersecurity experts started in the security field and transitioned to healthcare and healthcare data. You can read his musings on Hacking Healthcare […]

Read

Healthcare’s Security Posture As part of my interview series from BlackHat I spoke with Mike Weber VP Coalfire Labs – they are a large Cybersecurity Systems provider focused on securing transactions in the cloud working with all if not most of the cloud providers. Coalfire just released their Penetration Risk Report that included a special section on […]

Read

Encryption Algorithms Under Siege Over the course of history, the development and subsequent breaking of encryption standards have been a constant cycle. As new keys were developed so they were broken and the speed of with which new keys were broken has increased. Modern day encryption “Data Encryption Standard” or DES was launched int he […]

Read

Hospital Paging Systems Security I spoke with Mark Nunnikhoven, VP of Cloud Research at Trend Micro talking about their recently published paper: Leaking Beeps: Unencrypted Pager Messages in the Healthcare Industry which were designed and built in an era when it took a lot of resources and technology to access the system but now all it takes a couple hundred […]

Read

Security by Default The opening Keynote by Parisa Tabriz | Director of Engineering, Google: Optimistic Dissatisfaction with the Status Quo: Steps We Must Take to Improve Security in Complex Landscapes covered the journey taken by Google to bring the status of browsing into the Security age. It was sobering to see that a company like Google with the […]

Read

Hollywood Future Predictions Spoiler Alert – for anyone who has not watched the Showtime series “Homeland” or not got past Season 2 In the episode titled “Broken Heart” (December 2, 2012) we watch a hacker gain remote unauthorized access to the Vice Presidents Pacemaker and induces a tachycardia (increase in the heart rate) causing him to […]

Read

In the lead up to BlackHat and DefCon conferences, I am talking to one of the leaders in the space of security and the innovator who created and runs the outstanding security resource HaviBeenPwned (HIBP) Troy Hunt (@TroyHunt). He is an author of multiple top-rated courses on web security on Pluralsights and highly sought after speaker. The Ethics […]

Read

Ari Lightman – Finding Insights from Digital Data This week I am talking to Ari Lightman, Professor at the HJ Heinz College at Carnegie Mellon University where he teaches a class at the intersection of marketing and IT including Digital Transformation, Principles of Marketing and Measuring Social He shares insights on how we can smooth the transition […]

Read

  Patient Status Critical The threat level in Cyberspace keeps rising as evidenced by the recent alerts issued by the US Government (TA18-074A) and the long list of indicators of Compromise (IOC) Targeting critical infrastructure with an extensive list of tools, attacks, and techniques. While this is not new, with cases dating back to Stuxnet in 2007 […]

Read

In the spirit of survival given the overwhelming nature of joining 40,000 people at one conference, I offer up this year’s Incremental Guidance to not only surviving the HIMSS conference but enjoying it too (you can find my HIMSS16 Guide here). This will be my 21st HIMSS and 3rd year as a Social Media ambassador and every year […]

Read

Diverse Engaging and Eclectic What other conferences can you attend that offers you exercise and revitalization programs, alongside engaging presentations from key leaders in some of the top companies in pharmaceuticals, technology, healthcare and a demonstration environment packed with the latest and greatest innovations and technologies? The CNS Summit – now in its 8th year […]

Read

What are my BigIdeas2018 for the healthcare industry? They revolve around 3 topics: Security, Data, and Virtual care Technology continues to move at an exponential pace, leaving virtually no industry untouched. Healthcare is no exception – the technological progress in this space is offering incredible opportunities to improve the health of our population, reduce costs […]

Read

  Security is a Worldwide Problem The recent rash of ransomware and hacking attacks have highlighted once again the highly exposed nature of our information systems and the challenge of securing these systems. In May of 2017 Wannacry trojan encryptor malware was unleashed and spread rapidly bringing many hospitals in the National Health Service (NHS) to a standstill. It […]

Read



Search