INTERVIEW: Healthcare IT Today — Monitoring Packets is Contact Tracing for Cybersecurity
avatar

Problem to Solve: Monitoring Packets is “Contact Tracing” for Cybersecurity

I had the privilege to be interviewed by Colin Hung from HealthcareITtoday.com regarding the many challenges & risks associated with cybersecurity in Healthcare. In a nutshell, the session highlights the challenges and safety measures for Healthcare IT systems and availability as they face increases in triple extortion attempts through ransomware DDoS attacks.

Here is the link to the original article posted on the Healthcare IT Today website.

https://www.healthcareittoday.com/2022/05/30/monitoring-packets-is-contact-tracing-for-cybersecurity/

Monitoring Packets is Contact Tracing for Cybersecurity

GRCoutlook.com — A Model for a Successful Tools Rollout
avatar

Problem to Solve:  A Model for a Successful Tools Rollout

Here is a link to an article I wrote for GRCoutlook.com in March 2022.  It covers some of the best practices and guidelines for a successful network or cybersecurity tools deployment.

A Model for a Successful Tools Rollout

 

Gallery

INTERVIEW: SiliconAngle “TheCube” on IT Security in Healthcare
avatar

Problem to Solve: Hospitals combat rising denial-of-service attacks with network triage I had the privilege to be interviewed by SilconANGLE “theCUBE” regarding the many challenges in IT security in Healthcare. In a nutshell, the session highlights the challenges and safety … Continue reading

SIEM Bat Time .. SIEM Bat Channel (Hacktivism #8)
avatar

Problem to Solve: How can we integrate our Cybersecurity SIEM with data from our Application and Network Performance Management solutions? For those of us with a little “gray in our hair” will remember the end of the ORIGINAL Batman series … Continue reading

Living with the Threat of Ransomware
avatar

Problem to Solve:  How can we go about searching for potential Ransomware activity before our organization gets attacked? The evolution of security for so many has become a reactionary series of response and recovery. The latest highly publicized exploit leaves … Continue reading

The Evolving Role of the Network in the Pharmaceutical Industry
avatar

Working in the greater Philadelphia area now for nearly 17 years has given me the opportunity to work with many of the large pharmaceutical companies located in this area. And one thing you learn quickly is how heavily regulated they … Continue reading

Need a Dr. when your EMR gets sick ??
avatar

Problem to Solve – My healthcare organization is deploying an Electronic Medical Records (EMR) solution as per federal regulation.   What can I do if there are performance issues with it? Ah, the Affordable Health Care Act.   What a fun, enjoyable … Continue reading

Fat, Drunk and Stupid No Way to Go thru Big Data
avatar

Problem to Solve – My company is starting a Big Data / “Internet of Things” initiative as a Business Strategy.     How can I use my APM/NPM tools in this strategic effort? Yes, yes, we all remember the classic movie, Animal House … Continue reading

The Smoldering Ashes After the PCI Fire …PCI #6
avatar

Problem to Solve:  How can we use our APM/NPM solution to meet the PCI requirement of “regularly testing security systems and processes”? Contributing Author – Robert Wright, Network Engineer with 15+ years experience   As we wrap up this blog series I … Continue reading

The Fire is Almost Out …PCI #5
avatar

Problem to Solve: How can we use our APM/NPM solution to meet Network Authentication, Database Access, and Video requirements of PCI compliance?? Contributing Author – Robert Wright, Network Engineer with 15+ years experience This article will cover PCI requirements 7,8, and 9, all … Continue reading