Hacker Bonanza Ahead

Always on, always connected—and therein lies the danger. With the world going to a 24/7 online presence, the hacker’s universe of opportunity is never closed. And once the IoT gets everyone and everything connected, hackers will have an even more bountiful playground. Just recently, HP did another one of its hacker studies. The Fortify application security unit did an analysis of what wi... » read more

Securing Your Intestinal Data

Medical devices that use IP or wireless protocols to pass data and instruction between the host and the client aren’t all that unique. What is unique is the diversity, intensity, and depth of today’s security breaches, particularly in the face of the emerging Internet of Things/Everything (IoT/E) and the general lack of security across such medical devices. These elements can lay these medi... » read more