top of page
BLOGS
Blogs are original content from our authors on the topic of cybersecurity.
Search


FAIR Analysis of Fictitious Firm - Case Study - Part 4a
For a potential ransomware event that could impact the availability of a fictitious medium healthcare firm (see Part 1-3 of Case study used in Analysis), I meticulously conducted a Monte Carlo simulation using the FAIR technique (Taxonomy - Figure 1). The result, assuming average firm resilience and a sophisticated threat actor, was an average loss exposure of $1 million. This level of accuracy in the analysis, along with the inclusion of detailed cost assumptions (more on th

David
May 10, 20242 min read
Â
Â
Â


Medical Device Security: FDA Submission - Part 3
The FDA Guidance on "Cybersecurity in Medical Devices: Quality System Considerations and Content of Premarket Submissions" was issued on...

David
Oct 20, 20233 min read
Â
Â
Â


My AWS Journey: VPC, Networks and Route 53 - Part 2
In Part 1, I covered setting up identity and access management using Amazon AWS. In Part 2, we will focus on setting up a VPC and...

David
Aug 17, 20232 min read
Â
Â
Â


My AWS Journey: Identity and Access Management (IAM) - Part 1
This is my first post on my Amazon Web Services (AWS) journey with a series of short blogs. I hope to demystify and breakdown some basic...

David
Aug 9, 20233 min read
Â
Â
Â


Cardiac Implant System Recommendations For Technologists - Part 2
The appendix includes recommendations as part of the Medical Device Security whitepaper.

David
Nov 12, 20201 min read
Â
Â


Medical Device Security: Patient Safety - Part 1
INTRODUCTION Background The Department of Homeland Security assigns direct patient care as the largest sector in the United States that...

David
Oct 20, 20207 min read
Â
Â
Blog: Blog2
Blog: Events_Multiple
bottom of page