John Pescatore

See the following -

After Stuxnet: The New Rules Of Cyberwar

Robert L. Mitchell | Computerworld | November 5, 2012

Critical infrastructure providers face off against a rising tide of increasingly sophisticated and potentially destructive attacks emanating from hacktivists, spies and militarized malware. Read More »

Want To Protect Your EHR From Hackers? Secure Those Mobile Devices

Ephraim Schwartz | mHealthNews | August 28, 2014

Hackers used malware to penetrate Community Health Systems' firewall, and once inside, they made off with some 4.5 million medical records — a staggering but not surprising number to cyber security professionals.  While the uninformed may ask how such a thing could happen, the probable cause is user error...

Read More »