Security

Page: 2

This week I am talking to Kathleen Griggs, the President and Founder of Databuoy a unique and clever technology that uses acoustic sensor mesh networks to localize sounds to monitor activities and integrate with other information sources and makers of ShotPoint a gunshot detection mechanism that works indoors and outdoors. The company was founded in […]

Read

Humans the Weakest Link in Security   As humans, we are programmed with compassion and a desire to help but this human nature is the foundation of many of the risks that we are exposed to in the digital and cloud filled data world we all inhabit now. Our personal programming and desire to help […]

Read

Keeping Up With Innovation in Healthcare Starting this month I will be running a monthly review of “News you can Use” in the traditions of “Ask Me Anything” on HealthcareNOWRadio You can listen in to the first episode and read more about it here where I discuss topics ranging from Healthcare insurance and surprise billing, […]

Read

The World is Not Imploding with Violence As if things were not bad enough already with the never ending news cycle that shares the terrible events of the last 1/2/12/24 hours I read this morning that Ring from Amazon and their associated Neighbors application are inking deals with local police and emergency services to gain […]

Read

Secure Your Digital Life I can’t tell you the number of times I hear people tell me there’s no need to worry about being hacked – why would anyone ever be interested in me Well that’s true they are not, but they are interested in your accounts, your identity, and your money and they get to […]

Read

No More Sneakernet This week I am talking to Kevin McGrail (@KAMcGrail), Director of Business Growth at Infrashield and one of a few patients suffering from a rare disease “Anti DPPx Paraneoplastic Neurological Disorder” (you can read more about these diseases here) – one of only a handful of patients diagnosed with this. Kevin is […]

Read

You’ve Been Cloned Have you had the misfortune of finding an account that has duplicated your life and details and set up as if they are you – if not I’m going to suggest it’s just a matter of time. I have, multiple times and it’s not pleasant and hard to stop – there is […]

Read

Saving Healthcare Quality This week I am talking to Fred Trotter (@fredtrotter), CTO CareSet Systems – the first commercial Medicare Data company. Fred has a long and fascinating background that unlike many healthcare Cybersecurity experts started in the security field and transitioned to healthcare and healthcare data. You can read his musings on Hacking Healthcare […]

Read

Healthcare’s Security Posture As part of my interview series from BlackHat I spoke with Mike Weber VP Coalfire Labs – they are a large Cybersecurity Systems provider focused on securing transactions in the cloud working with all if not most of the cloud providers. Coalfire just released their Penetration Risk Report that included a special section on […]

Read

Encryption Algorithms Under Siege Over the course of history, the development and subsequent breaking of encryption standards have been a constant cycle. As new keys were developed so they were broken and the speed of with which new keys were broken has increased. Modern day encryption “Data Encryption Standard” or DES was launched int he […]

Read

Hospital Paging Systems Security I spoke with Mark Nunnikhoven, VP of Cloud Research at Trend Micro talking about their recently published paper: Leaking Beeps: Unencrypted Pager Messages in the Healthcare Industry which were designed and built in an era when it took a lot of resources and technology to access the system but now all it takes a couple hundred […]

Read

Security by Default The opening Keynote by Parisa Tabriz | Director of Engineering, Google: Optimistic Dissatisfaction with the Status Quo: Steps We Must Take to Improve Security in Complex Landscapes covered the journey taken by Google to bring the status of browsing into the Security age. It was sobering to see that a company like Google with the […]

Read

  Your Data but Who Owns It This excellent piece by ProPublica and NPR: Health Insurers Are Vacuuming Up Details About You — And It Could Raise Your Rates is part of a series – The Health Insurance Hustle by Marshall Allen that offers insights into the data-rich world we are entering and how this information may well be […]

Read

The Challenge of Security for Humans In the lead up to BlackHat and DefCon conferences I am talking to one of the leaders in that space and especially Social Engineering Chris Hadnagy (@HumanHacker), CEO & Co-Founder of Social-Engineering.com (@SocEngineerInc) and author of several books on the topic including a new one due out this summer ”Social […]

Read

In the lead up to BlackHat and DefCon conferences, I am talking to one of the leaders in the space of security and the innovator who created and runs the outstanding security resource HaviBeenPwned (HIBP) Troy Hunt (@TroyHunt). He is an author of multiple top-rated courses on web security on Pluralsights and highly sought after speaker. The Ethics […]

Read

Ari Lightman – Finding Insights from Digital Data This week I am talking to Ari Lightman, Professor at the HJ Heinz College at Carnegie Mellon University where he teaches a class at the intersection of marketing and IT including Digital Transformation, Principles of Marketing and Measuring Social He shares insights on how we can smooth the transition […]

Read

  Patient Status Critical The threat level in Cyberspace keeps rising as evidenced by the recent alerts issued by the US Government (TA18-074A) and the long list of indicators of Compromise (IOC) Targeting critical infrastructure with an extensive list of tools, attacks, and techniques. While this is not new, with cases dating back to Stuxnet in 2007 […]

Read

What are my BigIdeas2018 for the healthcare industry? They revolve around 3 topics: Security, Data, and Virtual care Technology continues to move at an exponential pace, leaving virtually no industry untouched. Healthcare is no exception – the technological progress in this space is offering incredible opportunities to improve the health of our population, reduce costs […]

Read

    The Desire to Help and Security We are programmed with a desire to help others in need but this trait is one of the reasons that hackers are so successful infiltrating our networks as I mentioned in this post. This past week the Black Hat conference took place followed by DefCon (in its 25th year) […]

Read

  Security is a Worldwide Problem The recent rash of ransomware and hacking attacks have highlighted once again the highly exposed nature of our information systems and the challenge of securing these systems. In May of 2017 Wannacry trojan encryptor malware was unleashed and spread rapidly bringing many hospitals in the National Health Service (NHS) to a standstill. It […]

Read

Secure Your Accounts Today No better example of simple security preventing what would have been at best a major disruption of my account or at worse a loss of control and embarrassment than last night I was joining the #HCLDR tweetup when I received notification on my phone Someone was trying to login to my account […]

Read

Great graphic that HITConsultant posted in this update SXSW Health Tech Trends Health and fitness apps, smart devices and connected products are making us more aware of our own health—and more active participants in our efforts to stay healthy. At the same time, health providers are looking to technology for smarter ways to deliver quality […]

Read

I was reminded of there Jerry Maguire movie clip when I read the latest in a long line of security breach stories – this one emanating from Canada where this group is in hot water over a massive 620,000 patient data breach…taking 4 months to notify authorities. Apparently Canada does not have a national Breach […]

Read



Search
%d bloggers like this: