Quantcast
Channel: attack modeling – Cyber security for biomed.
Browsing latest articles
Browse All 6 View Live

Image may be NSFW.
Clik here to view.

7 tips to improve security in a tough economy

Are you waiting for the next Gartner Security Report, making plans to evaluate some technology your CEO might not approve after she slashes your funding and maybe your job? As a security professional,...

View Article



Image may be NSFW.
Clik here to view.

The problem of security information sharing

In a previous post Sharing security information I suggested that fragmentation of knowledge is a root cause of security breaches. I was thinking about the problem of sharing data loss information this...

View Article

Image may be NSFW.
Clik here to view.

How to assess risk – Part II: Use attack modeling to collect data

In my article – “How to assess risk – Part I: Asking the right questions”, I talked about using attack modeling as a tool to collect data instead of using self-assessment check lists. In this article,...

View Article

Image may be NSFW.
Clik here to view.

Credit card shims

Using shims that fit into the ATM machine and read your mag stripe data has been around for a while.  It’s a good way to get the track 2 data but it won’t get your PIN (which if you are in Europe and...

View Article

Image may be NSFW.
Clik here to view.

The valley of death between IT and information security

IT is about executing predictable business processes. Security is about reducing the impact of unpredictable attacks to a your organization. In order ot bridge the chasm – IT and security need to adopt...

View Article


Image may be NSFW.
Clik here to view.

Killed by code – back to the future

Back in 2011, I thought it’s only a question of time before we have a drive by execution of a politician with an ICD (implanted cardiac device). Fast forward to Jan 9, 2017 FDA reported in a FDA Safety...

View Article
Browsing latest articles
Browse All 6 View Live




Latest Images