Cybersecurity and Authentication
Authentication became much more difficult By Charles Parker, II Â We all understand the issues phishing has caused over the last few...
Cybersecurity and FDA Compliance
FDA Ramping Up Cybersecurity Compliance By Charles Parker, II On October 1, 2023 the FDA enacted the Cybersecurity Refuse to Accept (RTA)...
Cybersecurity and Community Colleges
C’mon now! Even community colleges are compromised By Charles Parker With bad actors, these days, everything is a target. Many years ago,...
Cybersecurity and Crypto
Crypto Compromise…Again By Charles Parker Everyone is talking about cryptocurrency. Some of this is good with chatter on how much each...
Cybersecurity and Data Theft
Data theft-It’s not just for medical facilities By Charles Parker, II  There’s been volumes written about data theft in medical...
Cybersecurity and Autonomous Vehicles
New Attack Focused on AV (autonomous vehicle) Sensors By Charles Parker, II Attacks on AV sensors are popular at regional conferences and...
Cybersecurity and Pipelines
Oil Pipeline Targeted By Charles Parker, II Â Companies are targeted for attack for various reasons. One predominant reason continues to...
Cybersecurity and Car Makers
OOOOOPS... By Charles Parker Cars are an extension of our culture and society. Our persona is reflected in the vehicle we drive. This can...
Cybersecurity and SSH
SSH Tool Weaponized by Charles Parker, II One of the more interesting facets of this industry is there’s always something new to learn....
Cybersecurity and the Supply Chain
Supply Chain Lesson #587 By Charles Parker, II Â Bank of America is massive with branches throughout most of the nation and other...