Twitter Facebook Linkedin
6 Challenges to Healthcare Blockchain Adoption – By David Chou

6 Challenges to Healthcare Blockchain Adoption – By David Chou »

There are many upsides to sharing patient data in a secure, distributed method, it is hard to understand why the industry hasn’t already figured it out. However, there are some concrete objections to why it is challenging to share healthcare data. - Read more...

Trusting the Internet of Things – By Juan Carlos Lazcano

Trusting the Internet of Things – By Juan Carlos Lazcano »

For the IoT to truly fulfill its potential, OEMs and developers need to appreciate that success ultimately rests in ensuring that people trust it. - Read more...

Why the Healthcare Industry Should Learn to Share – By David Chou

Why the Healthcare Industry Should Learn to Share – By David Chou »

Blockchain technology is a step in moving towards patient-centered care as well as reduce the overall healthcare system overhead. - Read more...

Automation is the Missing Link in Security Response – By Chris Bedi

Automation is the Missing Link in Security Response – By Chris Bedi »

Ninety percent of CISOs have automated alerts via email and phone, but just one-third of CISOs automate more than 40 percent of their security processes today. - Read more...

A Rant on Endpoints – By Chris Roberts

A Rant on Endpoints – By Chris Roberts »

Are endpoints extending beyond the recognizable boundaries of use? - Read more...

What the Fusion Part 3 – The Answer is in the Three C’s – Susan Bond

What the Fusion Part 3 – The Answer is in the Three C’s – Susan Bond »

The answer is the 3 C's - Connect, Communicate, and Collaborate. - Read more...

Altruistic hacking, welcome to the new age of protests –  by Chris Roberts

Altruistic hacking, welcome to the new age of protests – by Chris Roberts »

Patch carefully or segment thoughtfully, but break in to do GOOD, not harm. - Read more...

What the Fusion Part 2: The Internet of Everything – By Susan Bond

What the Fusion Part 2: The Internet of Everything – By Susan Bond »

What does the convergence of IT, CT, and OT look like from the security world today? Unfortunately, the attack surfaces hackers can use are growing exponentially as the fusion of technologies continue. - Read more...

What the Fusion? Part 1 – Operational Technology Explained – By Susan Bond

What the Fusion? Part 1 – Operational Technology Explained – By Susan Bond »

Security can no longer be done by obscurity. - Read more...