Thoughts and Insights from the Cybersecurity Industry
Charlie Schick Healthcare Consultant
Medical Device Cybersecurity: Risk, Patching & Plutonium
This February I was at HIMMS Global Conference and Exhibition, one of the largest healthcare IT conferences in the US. My focus there was to see the latest on cyber in healthcare, particu...
Scott Coleman Director of Marketing / Product Mgmt.
Would You Trust Your Vendors to Protect You From a Cyberattack?
The marketing agency we use to design our cool promotional t-shirts is fun to work with – they have a totally hip workspace and even have a resident dog in their office. But do I trust ...
Phil Won Product Manager
The Importance of Routine System Updates
Raise your hand if you’ve ever felt a pang of guilt when your doctor reminded you to eat healthier and exercise more at your annual check-up. My hand is up. Of course, no one wants to l...
Garth Harrison Account Executive-Water Wastewater
America’s Water Infrastructure Act (AWIA) of 2018 – Prioritizing Cybersecurity Risk and Operational Resiliency
The recently signed America’s Water Infrastructure Act of 2018 is widely viewed as the most significant water infrastructure bill in decades. This comprehensive legislation was designed...
Dan Callahan Intel Sales Executive
Threats to Small Defense Businesses Can Have an Outsized Impact
Defense Industrial Base (DIB) manufacturers in the United States thoroughly understand the concepts of regulation and compliance. Almost no aspect of their business is outside the reach o...
Dennis Lanahan Director of International Sales
How Data Diode Cybersecurity is Being Used to Protect Critical Infrastructure in the Middle East
In late 2012, there was a severe, targeted malware cyber-attack on a number of oil & gas facilities using what became known as the Shamoon virus. This Windows-based malware differed f...