top of page
BLOGS
Blogs are original content from our authors on the topic of cybersecurity.
Search
David
May 10, 20242 min read
FAIR Analysis of Fictitious Firm - Case Study - Part 4a
For a potential ransomware event that could impact the availability of a fictitious medium healthcare firm (see Part 1-3 of Case study...
17 views0 comments
David
Oct 20, 20233 min read
Medical Device Security: FDA Submission - Part 3
The FDA Guidance on "Cybersecurity in Medical Devices: Quality System Considerations and Content of Premarket Submissions" was issued on...
28 views0 comments
David
Aug 17, 20232 min read
My AWS Journey: VPC, Networks and Route 53 - Part 2
In Part 1, I covered setting up identity and access management using Amazon AWS. In Part 2, we will focus on setting up a VPC and...
8 views0 comments
David
Aug 9, 20233 min read
My AWS Journey: Identity and Access Management (IAM) - Part 1
This is my first post on my Amazon Web Services (AWS) journey with a series of short blogs. I hope to demystify and breakdown some basic...
20 views0 comments
Blog: Blog2
Blog: Events_Multiple
bottom of page