PII

The FDA Finally Suggests Meaningful Action to Secure Medical Devices

by James Scott, Sr. Fellow, Institute for Critical Infrastructure Technology Healthcare depends on the crucial medical devices essential for the treatment and diagnosis of illness and disease. The Food and Drug Administration (FDA) regulates over 190,000 different devices, which are manufactured by more than 18,000 firms in more than 21,000 medical device facilities worldwide. Digital .. read more

Crushing Protectionist Silos to Expedite Tech Industry Niche Evolution: Using Social Media to Curate and Disseminate Information

by Drew Spaniel, Researcher, Institute for Critical Infrastructure Technology The digital threat landscape is comprised of organization-centric asymmetric warfare theaters populated by innumerable hyper-evolving sophisticated and unsophisticated adversaries with myriad motives, tools, techniques, and procedures. As trite as it sounds, it remains true now more than ever that “knowledge is power.” However, in the Digital .. read more

ICIT Analysis: “Facebook Poses a Massive Risk to National Security: But It’s Worse than You Think…”

Dragnet surveillance capitalists turned dragnet surveillance propagandists remain under-controlled to the point that they knowingly operate on a spectrum from criminally negligent to negligently criminal. While it is essential that negligent data brokers face the consequences for their nefarious activities, it is also vital that the underlying disease that founded the environment of their growth .. read more

The Necessity of Encryption for Preserving Critical Infrastructure Integrity: Protecting Data At-Rest, In-Transit, and During-Processing with Format Preserving Encryption

The Necessity of Encryption for Preserving Critical Infrastructure Integrity: Protecting Data At-Rest, In-Transit, and During-Processing with Format Preserving Encryption by James Scott, Sr. Fellow, ICIT DOWNLOAD A PDF OF THIS POST HERE Breaches Result in Loss of Trust Cybersecurity is rooted in trust. Organizations expend resources purchasing and maintaining the systems and applications that they .. read more

ICIT Analysis: How to Crush the Health Sector’s Ransomware Pandemic

The health sector is the most vulnerable, most targeted, and resoundingly least equipped to defend against hackers who are pummeling healthcare organizations with ransomware attacks.   This ransomware epidemic will only become more severe and costly as the infection volume in 2017 will trump infections in 2016. In this post, entitled “How to Crush the .. read more

ICIT Brief – Your Life, Repackaged and Resold: The Deep Web Exploitation of Health Sector Breach Victims

Despite being the most at-risk and perpetually breached critical infrastructure sector in the Nation, virtually all health sector organizations refuse to evolve their layered security to combat a hyper evolving threat landscape. As a result, when a healthcare system is breached and patient records are stolen, the entire brutal impact of the incident that resulted from .. read more