Introduction This post focuses on four medical device cybersecurity attack objectives: Stealing Protected Health Information (PHI) (Motive: Financial Gain) Ransomware (Motive: Financial Gain) Harming or killing a patient (Motive: Terrorism or Assassination) Using the medical device as a beachhead for
Introduction I believe complexity is the enemy of execution and unnecessary complication is often tied to ego and lack of clarity. In cybersecurity just about everything is overly complicated. I’m not sure why. I sometimes even wonder if I understand
CISO (Chief Information Security Officer) services can be an excellent business solution, but it doesn’t come without challenges. Many companies rush into finding vCISO services and end up with a relationship they did not expect. If your organization is considering
Data breaches impact millions and millions, if not billions, of individuals in today’s data-driven society. The amount of circulating data has increased because of digitalization, and security breaches have risen in tandem as cybercriminals prey on people’s daily data reliance.
This blog post is a transcript of Christian Espinosa’s explanation of cybersecurity hashing and collisions and covers the following: What is hashing? What is a hashing collision? What are hashing birthday attacks? Includes a demonstration of a 3-way MD5 collision