Women In Cybersecurity
The facts speak for themselves...there are literally hundreds of thousands of unfilled cybersecurity positions, there is expected to be a...
Cybersecurity and the Value of Verification
Value of verification By Charles Parker, II In early February of this year, there was a published story of millions of smart toothbrushes...
Cybersecurity and ICS Ransomware
By Charles Parker, II Ransomware can be directed at any company. The bigger, the better for the number of targets, accessibility, and...
Cybersecurity and World-Wide Ransomware
Ransomware: Not just a US issue by Charles Parker, II Ransomware is rampant through most industries for several reasons. One target...
Cybersecurity and Ransomware
Yet another ransomware incident -Charles Parker, II Ransomware seems to be everywhere. Not a week goes by that I don’t read about yet...
Cybersecurity and Repositories
Not too long ago, repositories were not targeted. If you used a library or repository, there was a reasonable assumption it could be...
Cybersecurity and Children's Hospitals
There’s been a lot written about medical facilities being targeted and compromised over the last five years. The compromises have varied...
Cybersecurity and International Standards for Medical Devices
With standards, regulations, statutes, etc., many feel this is a speedbump for their product. In the interest of the field, industry...
Cybersecurity and Standards
The technology expansion is pushing the options for medical device connectivity. The options and configurations used to be relatively...
Cybersecurity and IoT devices
IoT devices have evolved and expanded into commercial, and consumer uses. These appear throughout people’s homes with refrigerators,...