FBI Issues Ominous Warning of Imminent Cyber Attack on Critical Infrastructure

In testimony before the House Select Committee on the Chinese Communist Party yesterday, FBI Director Christopher Wray delivered an ominous message: “China’s hackers are positioning on American infrastructure in preparation to wreak ...

CISA Mitigation Guide for Healthcare Organizations: Part One

Build your cybersecurity strategy on a solid foundation of asset visibility and segmentation On November 20, 2023, the Cybersecurity Infrastructure and Security Agency (CISA) issued guidance for healthcare delivery organizations (HDOs) struggling ...
[Palo Alto NGFW + D3 Smart SOAR] Automate Network Security

Unpacking the Financial and Security Implications of Vendor Lock-In

The concept of ‘platformization’ – where leading vendors like Cisco or Palo Alto offer extensive, integrated security platforms – is becoming increasingly common. However, this trend towards platformization also brings to the ...
Countering Cyberthreats with a Whole Enterprise Security Approach

Countering Cyberthreats with a Whole Enterprise Security Approach

There has been a lot of attention paid to ransomware over the last few years, and with good reason. In 2021 Fierce Healthcare reported a 470% increase in ransomware attacks on the ...
Connected Devices Conspicuously Absent from 2023 Verizon Data Breach Investigations Report

Connected Devices Conspicuously Absent from 2023 Verizon Data Breach Investigations Report

The 2023 Verizon Data Breach Investigations Report is out. Like most folks in the cybersecurity industry, we downloaded it and pored over the contents to see what was new and relevant and ...
Healthcare M&A Means Acquiring Legacy Threats

Healthcare M&A Means Acquiring Legacy Threats

Fort Kent is a town of just over 4,000 residents abutting the Canadian border in rural Aroostook County, Maine. Fort Kent is famous for being the northernmost terminus of U.S. Route One, ...
What Are Cyber-Physical Systems?

What Are Cyber-Physical Systems?

Paradigmatic shifts are often not fully recognized until after they have occurred. Innovations are made, evolutions take place, and then someone realizes, “Hey, this is much different from when it started.” That’s ...
UK Government Announces Strategy to Protect the National Health Service from Cyber Threats

UK Government Announces Strategy to Protect the National Health Service from Cyber Threats

The “shared responsibility” philosophy for improving cybersecurity is becoming a worldwide phenomenon. It was woven throughout the U.S. National Cybersecurity Strategy issued by the White House in early March, and later that ...
BOD 23-01: Shedding Light on Federal Enterprise Asset Visibility

BOD 23-01: Shedding Light on Federal Enterprise Asset Visibility

Binding Operational Directive 23-01 can help close a government security gap   The Cybersecurity & Infrastructure Security Agency (CISA) recently issued an advisory on a dozen new exploits and vulnerabilities affecting industrial ...

What the FDA New Cybersecurity Mandate for Medical Devices Means to Healthcare Organizations

Before medical device manufacturers are able to release a product to market, they are subject to Food and Drug Administration (FDA) reviews to evaluate the safety and effectiveness of these devices. Since ...

Application Security Check Up