Cybersecurity and Ransomware
Yet another ransomware incident -Charles Parker, II Ransomware seems to be everywhere. Not a week goes by that I don’t read about yet...
Cybersecurity and Repositories
Not too long ago, repositories were not targeted. If you used a library or repository, there was a reasonable assumption it could be...
Cybersecurity and Children's Hospitals
There’s been a lot written about medical facilities being targeted and compromised over the last five years. The compromises have varied...
Cybersecurity and International Standards for Medical Devices
With standards, regulations, statutes, etc., many feel this is a speedbump for their product. In the interest of the field, industry...
Cybersecurity and Standards
The technology expansion is pushing the options for medical device connectivity. The options and configurations used to be relatively...
Cybersecurity and IoT devices
IoT devices have evolved and expanded into commercial, and consumer uses. These appear throughout people’s homes with refrigerators,...
Cybersecurity and Medical Device Connectivity
Medical Device Connectivity by Charles Parker, II With our new technology advancing so rapidly on different fronts, the nuances in...
Cybersecurity and Autonomous Vehicles
By Charles Parker II This is a fantastic age to live in. We have vehicles that notify us when another vehicle is near us, when we’re too...
Cybersecurity and Medical IoT Devices
Medical IoT Devices by Charles Parker, II The technology with medical devices and the protocols continue to improve. For example, we...
Cybersecurity and Medical Devices
Over the years there have been differing targets, moving from the enterprise side, to vehicles, satellites, shipping, aeronautics, and...

