Recently, I wrote about the three vectors of a healthcare cyber attack. This is the second of a three-part series examining each vector in depth. Over the past couple of months, I’ve written about the three vectors of a healthcare cyber attack. Most recently, I looked in depth at the first vector, what we usually think of as “traditional attacks and malware”. These sorts of attacks continue to make headlines, but as healthcare evolves and increasing numbers of medical devices begin feeding data directly into health information... [Read More]
by RSS Ryan Witt  |  Apr 10, 2015  |  Filed in: Industry Trends
Network security has traditionally focused on border protection strategies - If you could keep the bad guys out, then your computers, users, and data were safe. As next-generation firewalls (NGFWs) and unified threat management (UTM) appliances hit the market, system administrators and security pros found themselves with a pretty effective combination of visibility and protection. Now, though, we’re finding that an increasing number of attacks are coming from inside the network itself. Many of the headline-grabbing breaches in the last... [Read More]
by RSS Jonas Tichenor  |  Jan 27, 2015  |  Filed in: Industry Trends