Cybersecurity and Medical Device Connectivity
Medical Device Connectivity by Charles Parker, II With our new technology advancing so rapidly on different fronts, the nuances in...
Cybersecurity and Autonomous Vehicles
By Charles Parker II This is a fantastic age to live in. We have vehicles that notify us when another vehicle is near us, when we’re too...
Cybersecurity and Medical IoT Devices
Medical IoT Devices by Charles Parker, II The technology with medical devices and the protocols continue to improve. For example, we...
Cybersecurity and Medical Devices
Over the years there have been differing targets, moving from the enterprise side, to vehicles, satellites, shipping, aeronautics, and...
Cybersecurity and Linux SSH Servers
Linux SSH Servers as Viable Targets by Charles Parker, II Cybersecurity is such an interesting field. Just when you have the...
Cybersecurity and the Auto Industry
Hyundai works through data breach by Charles Parker, II From the published accounts, there seems to be an uptick in attacks against the...
Cybersecurity and the Energy Sector
Energy Sector’s Criticality By Charles Parker, II The attacks on the energy sector have been increasing. This is a critical vulnerability...
Cybersecurity and Costs
Cybersecurity Costs By Charles Parker, II I have consulted with a company recently. They were reviewing the ISO27001:2022 certification....
Cybersecurity and Electronic Health Records
EHR as a critical target By Charles Parker, II In the enterprise/traditional IT, there are the production networks. These must be up and...
Cybersecurity and IoMT
Human Cost in Healthcare Increases Criticality by Charles Parker, II The healthcare industry is interesting. This appears to be...