network security

See the following -

Increasing Health IT, EHR Investment Runs Up Practice Costs

Sara Heath | EHR Intelligence | August 10, 2016

New data from MGMA shows that increasing health IT and EHR investments are running up major practice costs. Health IT and EHR investments are costing physician-owned multispecialty practices thousands of dollars per physician, according to a new report from the Medical Group Management Association (MGMA). The 2016 MGMA Cost and Revenue Report shows that health technologies such as EHRs ran physician practices up to $32,500 per physician in 2015...

Read More »

Investigation: US Power Grid Vulnerable to Foreign Hacks

Garance Burke and Jonathan Fahey | Phys.org | December 21, 2015

Security researcher Brian Wallace was on the trail of hackers who had snatched a California university's housing files when he stumbled into a larger nightmare: Cyberattackers had opened a pathway into the networks running the United States power grid. Digital clues pointed to Iranian hackers. And Wallace found that they had already taken passwords, as well as engineering drawings of dozens of power plants, at least one with the title "Mission Critical." The drawings were so detailed that experts say skilled attackers could have used them, along with other tools and malicious code, to knock out electricity flowing to millions of homes...

Read More »

The Goldilocks Problem of Mobile Security - Usability vs. Security

The “Goldilocks and the Three Bears” story begins with a girl tasting porridge. The first bowl is too hot, the second is too cold, and the third is “just right.” This article considers mobile device security for government and organizations. The theme is trade-offs between the usability of a mobile device and security for confidential organizational data such as conversations, messages, documents, images, and locations. The security, confidentiality, and integrity of communication are key. However, if the usability of mobile devices for end-users, administrators, and organizations is too challenging, then the availability of the data for productive work is lost.

Read More »

What the IoT can learn from the health care industry

After a short period of excitement and rosy prospects in the movement we’ve come to call the Internet of Things (IoT), designers are coming to realize that it will survive or implode around the twin issues of security and user control: a few electrical failures could scare people away for decades, while a nagging sense that someone is exploiting our data without our consent could sour our enthusiasm. Early indicators already point to a heightened level of scrutiny — Senator Ed Markey’s office, for example, recently put the automobile industry under the microscope for computer and network security. Read More »

What are the Latest IoT threats to Network Security

Event Details
Type: 
Seminar/Webinar
Date: 
July 23, 2020 - 1:00pm - 2:00pm

Using research from the Bastille Threat Research team as well as analysis of data from the National Vulnerability Database, Dr. Bob Baxley will examine recently disclosed vulnerabilities in protocols used by IoT devices which hackers can use to bypass your security, gain access to your systems, and exfiltrate data and voice information.

Read More »