Demanding a Plan for Cyber Resilience in the IoT
By Anthony Grieco Earlier this month, I wrote about the need for a holistic security strategy for the Internet of Things (IoT). It’s more than securing a ‘thing‘ within the IoT – it’s about building resilience for the whole system. Cyber resilience is about managing risk; identifying potential risks, evaluating the likelihood of them occurring […]
Securing Medical Devices – The Need for a Different Approach – Part 1
By Richard Staynings When I ask the question of Healthcare CIOs and CISOs “What keeps you up at night?” one of the most common answers I receive – after the usual jokes about indigestion, or the snoring spouse, is the problem of what to do about securing medical devices in our hospitals. Most healthcare executives […]
Securing Medical Devices – The Need for a Different Approach – Part 1
By Richard Staynings When I ask the question of Healthcare CIOs and CISOs “What keeps you up at night?” one of the most common answers I receive – after the usual jokes about indigestion, or the snoring spouse, is the problem of what to do about securing medical devices in our hospitals. Most healthcare executives […]
Neu: Robustes DECT-Telefon IP65 von innovaphone
Frisch am Start ist ein neues, robustes DECT-Telefon von innovaphone. Das IP65 ersetzt ab sofort das bisherige Gerät IP63. Mit der Schutzklasse IP44 eignet sich das neue mobile Telefon auch für den Einsatz in staubbelasteten Umgebungen. Ausgestattet mit einem beleuchteten Farb-Display und einem stabilen Gehäuse, bringt das IP65 weitere, sinnvolle Ausstattungen mit: Vibrationsalarm Bluetooth 18 […]
Cisco Coverage for Shadow Brokers 2017-04-14 Information Release
By Talos Group On Friday, April 14, the actor group identifying itself as the Shadow Brokers released new information containing exploits for previously disclosed and undisclosed vulnerabilities that affect various versions of Microsoft Windows, as well as applications such as Lotus Domino. Additionally, the release included previously unknown tools, including an exploitation framework identified as […]
Cisco Coverage for Shadow Brokers 2017-04-14 Information Release
By Talos Group On Friday, April 14, the actor group identifying itself as the Shadow Brokers released new information containing exploits for previously disclosed and undisclosed vulnerabilities that affect various versions of Microsoft Windows, as well as applications such as Lotus Domino. Additionally, the release included previously unknown tools, including an exploitation framework identified as […]
Threat Round-up for Apr 7 – Apr 14
By Talos Group Today, Talos is publishing a glimpse into the most prevalent threats we’ve observed between April 7 and April 14. As with previous round-ups, this post isn’t meant to be an in-depth analysis. Instead, this post will summarize the threats we’ve observed by highlighting key behavior characteristics, indicators of compromise, and how our […]

