Category: Uncategorized

Charlie Schick Healthcare Consultant
What do HHS’s latest cybersecurity guidelines mean for healthcare organizations?
At the end of 2018, the US Department of Health and Human Services (HHS) released guidance on cybersecurity best practices for healthcare organizations. Like many in the healthcare indust...

Charlie Schick Healthcare Consultant
Medical Device Cybersecurity: Risk, Patching & Plutonium
This February I was at HIMMS Global Conference and Exhibition, one of the largest healthcare IT conferences in the US. My focus there was to see the latest on cyber in healthcare, particu...

Scott Coleman Director of Marketing / Product Mgmt.
Would You Trust Your Vendors to Protect You From a Cyberattack?
The marketing agency we use to design our cool promotional t-shirts is fun to work with – they have a totally hip workspace and even have a resident dog in their office. But do I trust ...

Phil Won Product Manager
The Importance of Routine System Updates
Raise your hand if you’ve ever felt a pang of guilt when your doctor reminded you to eat healthier and exercise more at your annual check-up. My hand is up. Of course, no one wants to l...

Garth Harrison Account Executive-Water Wastewater
America’s Water Infrastructure Act (AWIA) of 2018 – Prioritizing Cybersecurity Risk and Operational Resiliency
The recently signed America’s Water Infrastructure Act of 2018 is widely viewed as the most significant water infrastructure bill in decades. This comprehensive legislation was designed...

Dan Callahan Intel Sales Executive
Threats to Small Defense Businesses Can Have an Outsized Impact
Defense Industrial Base (DIB) manufacturers in the United States thoroughly understand the concepts of regulation and compliance. Almost no aspect of their business is outside the reach o...

Dennis Lanahan Director of International Sales
How Data Diode Cybersecurity is Being Used to Protect Critical Infrastructure in the Middle East
In late 2012, there was a severe, targeted malware cyber-attack on a number of oil & gas facilities using what became known as the Shamoon virus. This Windows-based malware differed f...

Garth Harrison Account Executive-Water Wastewater
How Digital Transformation is Changing Water and Wastewater Cybersecurity
Industries that once had their IT and OT (operational technology) networks siloed are realizing the growing pains of the connected, digital world. Present day OT networks have a growing r...

Mark Toussaint Product Manager
ReCon: A New Chapter | Embrace the Value of Secure Two-way Communication
I recently attended the DistribuTECH and OSIsoft PI World, as an exhibitor and a speaker, and I had a number of great conversations with attendees about cybersecurity in the industrial, c...

Scott Coleman Director of Marketing / Product Mgmt.
Implementing DHS Best Practices to Secure Industrial Control Systems
Modern advancements in industrial control systems (ICS) enable marked improvements in efficiency, production, reliability, and safety, all through increased use of “smart” assets and...

Scott Coleman Director of Marketing / Product Mgmt.
One-Way Data Flow, Secured by Design
Let's address the news.
We thought long and hard on what to write about for our first blog post. It’s a special milestone! But it was inevitable that we address the current news headli...