top of page
BLOGS
Blogs are original content from our authors on the topic of cybersecurity.
Search


AWS Network Security: Essential Best Practices for AWS Secure Network Solutions
Securing a network in the cloud is a critical task. AWS provides a robust set of tools and services to help protect your infrastructure. However, using these tools effectively requires understanding and applying best practices. In this post, I will share essential insights and practical steps to enhance your AWS secure network solutions. Understanding AWS Secure Network Solutions AWS offers a variety of services designed to secure your network environment. These include Virtu

staysecure
4 days ago4 min read


Discover the Benefits of Cybersecurity Workshops Online
Cybersecurity is a critical concern in today’s digital world. Protecting personal and professional data requires ongoing education and awareness. One effective way to improve cybersecurity knowledge is through cybersecurity workshops online. These workshops provide practical skills and up-to-date information to help individuals and professionals stay secure. Why Choose Cybersecurity Workshops Online? Online workshops offer flexibility and accessibility. Participants can join

staysecure
4 days ago2 min read


Top Online Courses for Improving Cyber-Hygiene: Cybersecurity Training Online
Cybersecurity is a critical skill in today’s digital world. Protecting personal and professional data requires knowledge and vigilance. I have explored various options to improve cyber-hygiene through online learning. This post highlights the best cybersecurity training online to help you stay secure. Why Choose Cybersecurity Training Online? Online training offers flexibility and access to expert knowledge. You can learn at your own pace and revisit materials as needed. Many

staysecure
4 days ago3 min read


AWS Cloud Security Practices: AWS VPC Security Best Practices to Follow
Securing your cloud infrastructure is critical. Amazon Web Services (AWS) provides a robust platform, but it requires careful configuration to maintain security. One of the foundational components of AWS security is the Virtual Private Cloud (VPC). A VPC allows you to isolate your cloud resources in a virtual network that you control. This post covers essential AWS cloud security practices, focusing on VPC security. Practical steps and recommendations to help you protect your

davidg
Feb 173 min read


AWS Network Security: Essential Best Practices for AWS Secure Network Solutions
Securing a network in the cloud is a critical task. AWS provides a robust platform with many tools to help protect your infrastructure. However, it requires careful planning and execution to ensure your environment remains secure. In this post, essential best practices for AWS secure network solutions. These practices will help you build a strong defense against threats and maintain control over your cloud resources. Understanding AWS Secure Network Solutions AWS offers a var

staysecure
Feb 174 min read


Top Platforms for US Online Cybersecurity Training
Cybersecurity is a critical field that continues to grow in importance. With increasing cyber threats, gaining the right skills is essential. Here are the top platforms for cybersecurity education in the US. These platforms offer quality courses, certifications, and resources to help you build your expertise. Whether you are starting or advancing your career, these options provide practical learning paths. Leading Platforms for US Online Cybersecurity Training Several platfor

staysecure
Feb 54 min read


Master Cyber Hygiene Through Online Security Training Courses
Cybersecurity is a critical skill in today’s digital world. Every day, new threats emerge that can compromise personal and professional data. Learning how to protect yourself and your information is essential. One of the best ways to do this is through online security training courses. These courses provide structured knowledge and practical skills to help you maintain strong cyber hygiene. Why Choose Online Security Training Courses? Online security training courses offer fl

staysecure
Feb 24 min read


FAIR Analysis of Fictitious Firm - Case Study - Part 4a
For a potential ransomware event that could impact the availability of a fictitious medium healthcare firm (see Part 1-3 of Case study used in Analysis), I meticulously conducted a Monte Carlo simulation using the FAIR technique (Taxonomy - Figure 1). The result, assuming average firm resilience and a sophisticated threat actor, was an average loss exposure of $1 million. This level of accuracy in the analysis, along with the inclusion of detailed cost assumptions (more on th

David
May 10, 20242 min read


Medical Device Security: FDA Submission - Part 3
The FDA Guidance on "Cybersecurity in Medical Devices: Quality System Considerations and Content of Premarket Submissions" was issued on...

David
Oct 20, 20233 min read


My AWS Journey: VPC, Networks and Route 53 - Part 2
In Part 1, I covered setting up identity and access management using Amazon AWS. In Part 2, we will focus on setting up a VPC and...

David
Aug 17, 20232 min read


My AWS Journey: Identity and Access Management (IAM) - Part 1
This is my first post on my Amazon Web Services (AWS) journey with a series of short blogs. I hope to demystify and breakdown some basic...

David
Aug 9, 20233 min read


Cardiac Implant System Recommendations For Technologists - Part 2
The appendix includes recommendations as part of the Medical Device Security whitepaper.

David
Nov 12, 20201 min read


Medical Device Security: Patient Safety - Part 1
INTRODUCTION Background The Department of Homeland Security assigns direct patient care as the largest sector in the United States that...

David
Oct 20, 20207 min read
Blog: Blog2
Blog: Events_Multiple
bottom of page
