Owl Blog
Thoughts and Insights from the Cybersecurity Industry

Charlie Schick Healthcare Consultant
Why Do A Medical Device Assessment, Part 4: Access Granted
In the last post, we got up close and personal with the device, and now it was time to really try to dig into the administrative functions. While the unauthenticated (non-password-protect...

Charlie Schick Healthcare Consultant
Why Do A Medical Device Assessment, Part 3: The Device
In the previous two posts in this series, I talked about the reasons cybersecurity analysis on medical devices is necessary and some processes behind device analysis.
In the next coupl...

Charlie Schick Healthcare Consultant
Why Do A Medical Device Assessment, Part 2: How We Do It
In my last post, I talked a bit about the cybersecurity challenges around medical devices.
In this post, I want to tell you a bit about the process of device cybersecurity analysis, wi...

Charlie Schick Healthcare Consultant
Why Do A Medical Device Assessment, Part 1: “It’s Not a Good Situation”
Relevant to this series, Owl’s Device Inspection and Analysis Lab focuses on security analysis of all sorts of devices, ranging from laptops, servers, and mobile devices; to securing op...