Problem to Solve: Monitoring Packets is “Contact Tracing” for Cybersecurity
I had the privilege to be interviewed by Colin Hung from HealthcareITtoday.com regarding the many challenges & risks associated with cybersecurity in Healthcare. In a nutshell, the session highlights the challenges and safety measures for Healthcare IT systems and availability as they face increases in triple extortion attempts through ransomware DDoS attacks.
Here is the link to the original article posted on the Healthcare IT Today website.
Monitoring Packets is Contact Tracing for Cybersecurity
Problem to Solve: Hospitals combat rising denial-of-service attacks with network triage I had the privilege to be interviewed by SilconANGLE “theCUBE” regarding the many challenges in IT security in Healthcare. In a nutshell, the session highlights the challenges and safety … Continue reading
Problem to Solve: What can we do to protect VPN connections, remote employees working @ home, and B2B links from Cybersecurity / Hacktivism? Can you picture our happy dwarfs that work from home singing to themselves all day long “Remote .. Remote … It’s Work From Home We … Continue reading
Problem to Solve: How can we go about searching for potential Ransomware activity before our organization gets attacked? The evolution of security for so many has become a reactionary series of response and recovery. The latest highly publicized exploit leaves … Continue reading
Problem to Solve: How can we best identify and mitigate Denial of Service (DoS) Attacks? Everyday, service providers and large enterprises are victims of denial of service (DoS) attacks. Over the last few years, Sony and Microsoft couldn’t deliver gaming … Continue reading
Problem to Solve: What can we do to protect our organization from Hacktivism, specifically in the area of Critical Links and Infrastructure? Have you ever seen any of your critical business links that look a “little congested“? I bet that some of … Continue reading
Problem to Solve: What can we do to protect our organization from Hacktivism? How can I use my Application and Network Performance Management tools to help assist? Nope, not starting this article out with 80’s movie reference, music video, silly … Continue reading
Problem to Solve — How can you add additional cybersecurity analysis functionality to protect your environment and your company’s intellectual capital … with some of your existing APM/NPM tools? Let’s face it …. CyberSecurity is an all-out war, and it … Continue reading