John Pescatore
See the following -
After Stuxnet: The New Rules Of Cyberwar
Robert L. Mitchell | Computerworld | November 5, 2012
Critical infrastructure providers face off against a rising tide of increasingly sophisticated and potentially destructive attacks emanating from hacktivists, spies and militarized malware. Read More »
- Login to post comments
Want To Protect Your EHR From Hackers? Secure Those Mobile Devices
Ephraim Schwartz | mHealthNews | August 28, 2014
Hackers used malware to penetrate Community Health Systems' firewall, and once inside, they made off with some 4.5 million medical records — a staggering but not surprising number to cyber security professionals. While the uninformed may ask how such a thing could happen, the probable cause is user error...
- Login to post comments