Video Screencast Help

Search

Search results

The clock is ticking... This is part two of a three part series discussing the end-of-life (EOL) of Windows Server 2003. As mentioned in  part one , on July 14th, 2015 Microsoft ...
Blog Entry by Digital_Kru | 09 Mar 2015 | 0 comments
Your Cyber Trident  If you could only do three things for better cyber resilience, what would they be? You are faced with many questions to answer and they are ...
Blog Entry by James Hanlon | 04 Mar 2015 | 0 comments
Available for all signed-up participants, sign-up today Good day all! We're very pleased to share that the efforts over the Year End Break were highly successful and the ...
Blog Entry by Steve C Blair | 09 Jan 2015 | 0 comments
GOV.UK: Verify is the UK govenment replacement to the current government gateway ID solution. The GDS (Government Digital Services) as due to release the framework 2 at the end of November 2014 for bidders to apply to become Identity providers. The ...
Article by Rob Watton | 31 Oct 2014 | 0 comments
Report from Day 1 of the FDA Workshop on Medical Device Security The title is probably a good quote to reflect the spirit of the first day of the public workshop on “Collaborative ...
Blog Entry by Axel Wirth | 21 Oct 2014 | 0 comments
Why this post? Over the past few months we have seen a number of reports on breaches of healthcare organizations and medical device manufacturers where the suspected or documented target was intellectual property data related to medical devices. ...
Blog Entry by Axel Wirth | 26 Aug 2014 | 0 comments
What is big at the big show this year. One of the great things about being the Health IT Officer at a big security firm is that no one really knows what you do.  I get to slip quietly ...
Blog Entry by David Finn | 11 Feb 2014 | 0 comments
Medical Records held for Ransom Yahoo!7 News Australia just published a noteworthy article: " Cyber attacks: pharmacies, patient records targeted 'ransomware' attacks ...
Blog Entry by Axel Wirth | 21 Jan 2014 | 1 comment
I guess we need to face it. Sality is here to stay. We have been dealing with new Sality variants for more than 8 years and the Sality.AE family for a little over 5…the variants keep coming. It has become one of the most common file infectors ...
Blog Entry by Brandon Noble | 30 Dec 2013 | 2 comments
can transmit information between computers using high-frequency sound waves inaudible to the human ear. The duo successfully sent passwords and more between non-networked Lenovo T400 laptops via the notebooks’ built-in microphones and speakers. ...
Blog Entry by V4 | 03 Dec 2013 | 0 comments