INTERVIEW: Healthcare IT Today — Monitoring Packets is Contact Tracing for Cybersecurity
avatar

Problem to Solve: Monitoring Packets is “Contact Tracing” for Cybersecurity

I had the privilege to be interviewed by Colin Hung from HealthcareITtoday.com regarding the many challenges & risks associated with cybersecurity in Healthcare. In a nutshell, the session highlights the challenges and safety measures for Healthcare IT systems and availability as they face increases in triple extortion attempts through ransomware DDoS attacks.

Here is the link to the original article posted on the Healthcare IT Today website.

https://www.healthcareittoday.com/2022/05/30/monitoring-packets-is-contact-tracing-for-cybersecurity/

Monitoring Packets is Contact Tracing for Cybersecurity

GRCoutlook.com — A Model for a Successful Tools Rollout
avatar

Problem to Solve:  A Model for a Successful Tools Rollout

Here is a link to an article I wrote for GRCoutlook.com in March 2022.  It covers some of the best practices and guidelines for a successful network or cybersecurity tools deployment.

A Model for a Successful Tools Rollout

 

INTERVIEW: Healthcare IT Today — Does IoT Increase Security Risks in Healthcare?
avatar

Problem to Solve: Does IoT Increase Security Risks in Healthcare?

I had the privilege to be interviewed by Colin Hung from HealthcareITtoday.com regarding the many challenges & risks associated with Internet of Things security in Healthcare. In a nutshell, the session highlights the benefits, threats & considerations related to IoT deployments.

Here is the link to the original article posted on the Healthcare IT Today website.

Does IoT Increase Security Risks in Healthcare?

Would Homer Simpson Protect Virtualized Servers? (Hacktivism #5)
avatar

Problem to Solve:   What can we do to protect our Virtualized Server Infrastructure and Application Services against Hacktivism?   OK, I don’t know exactly what Homer Simpson thinks about virtualized servers, but do have a guess on his reaction. 🙂   So the … Continue reading

Baby Got TAPs !!
avatar

Problem to Solve: How can we guarantee the collection of network traffic that feeds our APM/NPM, Security, & Big Data tools inside of our production network? In my previous video blog, I discussed the use of SPANs with their associated pros and cons (“To … Continue reading

The Smoldering Ashes After the PCI Fire …PCI #6
avatar

Problem to Solve:  How can we use our APM/NPM solution to meet the PCI requirement of “regularly testing security systems and processes”? Contributing Author – Robert Wright, Network Engineer with 15+ years experience   As we wrap up this blog series I … Continue reading

If a PCI Tree Falls in the Forest, Are You Non-Compliant? PCI #2
avatar

Problem to Solve:  My company must comply with PCI.   How can I best leverage my APM/NPM tools ‘to be PCI compliant’ inside my business? Contributing Author – Robert Wright, Network Engineer with 15+ years experience In our last segment, … Continue reading

The “No Tools” Myth Your Auditor is Spreading … PCI #1
avatar

Problem to Solve:  My company must comply with PCI.   Can I even run APM/NPM tools inside my business? Contributing Author – Robert Wright, Network Engineer with 15+ years experience The Great PCI Myth When I started researching PCI for … Continue reading

We Didn’t Start the (PCI) Fire !! …. The Series !
avatar

Problem to Solve – My company has several APM/NPM solutions in our environment.  How can we use them to be PCI Compliant? Contributing Author – Robert Wright, Network Engineer with 15+ years experience   Is that credit card data in … Continue reading

Does your Cybersecurity Solution say “VN-Tags? We don’t need no stinkin’ VN-Tags …”
avatar

Problem to Solve — How can I make sure that my Cybersecurity Tools and Solutions will work in a Cisco Nexus Environment with VN-Tags? Ok, maybe not my best lead in for a Blog article analogy.   What in world does … Continue reading