Cybersecurity and AI
Leveraging AI to accelerate your cybersecurity By Charles Parker, II AI seems to be everywhere and gaining momentum. AI is being used to...
Cybersecurity and Ransomware
Ransomware is no joke by Charles Parker, II Ransomware is an epidemic. Incidents of these have increased over the last year, occurring...
Cybersecurity and Authentication
Authentication became much more difficult By Charles Parker, II Â We all understand the issues phishing has caused over the last few...
Cybersecurity and FDA Compliance
FDA Ramping Up Cybersecurity Compliance By Charles Parker, II On October 1, 2023 the FDA enacted the Cybersecurity Refuse to Accept (RTA)...
Cybersecurity and Community Colleges
C’mon now! Even community colleges are compromised By Charles Parker With bad actors, these days, everything is a target. Many years ago,...
Cybersecurity and Crypto
Crypto Compromise…Again By Charles Parker Everyone is talking about cryptocurrency. Some of this is good with chatter on how much each...
Cybersecurity and Data Theft
Data theft-It’s not just for medical facilities By Charles Parker, II  There’s been volumes written about data theft in medical...
Cybersecurity and Autonomous Vehicles
New Attack Focused on AV (autonomous vehicle) Sensors By Charles Parker, II Attacks on AV sensors are popular at regional conferences and...
Cybersecurity and Pipelines
Oil Pipeline Targeted By Charles Parker, II Â Companies are targeted for attack for various reasons. One predominant reason continues to...
Cybersecurity and Car Makers
OOOOOPS... By Charles Parker Cars are an extension of our culture and society. Our persona is reflected in the vehicle we drive. This can...