top of page
BLOGS
Blogs are original content from our authors on the topic of cybersecurity.
Search
David
May 102 min read
FAIR Analysis of Fictitious Firm - Case Study - Part 4a
For a potential ransomware event that could impact the availability of a fictitious medium healthcare firm (see Part 1-3 of Case study...
17 views0 comments
David
Oct 20, 20233 min read
Medical Device Security: FDA Submission - Part 3
The FDA Guidance on "Cybersecurity in Medical Devices: Quality System Considerations and Content of Premarket Submissions" was issued on...
28 views0 comments
David
Aug 17, 20232 min read
My AWS Journey: VPC, Networks and Route 53 - Part 2
In Part 1, I covered setting up identity and access management using Amazon AWS. In Part 2, we will focus on setting up a VPC and...
8 views0 comments
David
Aug 9, 20233 min read
My AWS Journey: Identity and Access Management (IAM) - Part 1
This is my first post on my Amazon Web Services (AWS) journey with a series of short blogs. I hope to demystify and breakdown some basic...
19 views0 comments
David
Nov 12, 20201 min read
Cardiac Implant System Recommendations For Technologists - Part 2
The appendix includes recommendations as part of the Medical Device Security whitepaper.
66 views
David
Oct 20, 20207 min read
Medical Device Security: Patient Safety - Part 1
INTRODUCTION Background The Department of Homeland Security assigns direct patient care as the largest sector in the United States that...
43 views
Blog: Blog2
Blog: Events_Multiple
bottom of page