Problem to Solve: Monitoring Packets is “Contact Tracing” for Cybersecurity
I had the privilege to be interviewed by Colin Hung from HealthcareITtoday.com regarding the many challenges & risks associated with cybersecurity in Healthcare. In a nutshell, the session highlights the challenges and safety measures for Healthcare IT systems and availability as they face increases in triple extortion attempts through ransomware DDoS attacks.
Here is the link to the original article posted on the Healthcare IT Today website.
Problem to Solve: Hospitals combat rising denial-of-service attacks with network triage I had the privilege to be interviewed by SilconANGLE “theCUBE” regarding the many challenges in IT security in Healthcare. In a nutshell, the session highlights the challenges and safety … Continue reading →
Problem to Solve: How can we integrate our Cybersecurity SIEM with data from our Application and Network Performance Management solutions? For those of us with a little “gray in our hair” will remember the end of the ORIGINAL Batman series … Continue reading →
Problem to Solve: How can we go about searching for potential Ransomware activity before our organization gets attacked? The evolution of security for so many has become a reactionary series of response and recovery. The latest highly publicized exploit leaves … Continue reading →
Working in the greater Philadelphia area now for nearly 17 years has given me the opportunity to work with many of the large pharmaceutical companies located in this area. And one thing you learn quickly is how heavily regulated they … Continue reading →
Problem to Solve – My healthcare organization is deploying an Electronic Medical Records (EMR) solution as per federal regulation. What can I do if there are performance issues with it? Ah, the Affordable Health Care Act. What a fun, enjoyable … Continue reading →
Problem to Solve – My company is starting a Big Data / “Internet of Things” initiative as a Business Strategy. How can I use my APM/NPM tools in this strategic effort? Yes, yes, we all remember the classic movie, Animal House … Continue reading →
Problem to Solve: How can we use our APM/NPM solution to meet the PCI requirement of “regularly testing security systems and processes”? Contributing Author – Robert Wright, Network Engineer with 15+ years experience As we wrap up this blog series I … Continue reading →
Problem to Solve: How can we use our APM/NPM solution to meet Network Authentication, Database Access, and Video requirements of PCI compliance?? Contributing Author – Robert Wright, Network Engineer with 15+ years experience This article will cover PCI requirements 7,8, and 9, all … Continue reading →