CVE-2019-0708 – Remote Desktop Protocol and Remote Code Execution #Bluekeep

On May 14th, 2019, Microsoft released their usual set of updates, referred to within the industry as “Patch Tuesday.” At first glance, the inclusion of CVE-2019-0708 appeared to be similar to all the other updates released on that day—it included a writeup containing an overview of the update, including the Continue Reading

Industry 4.0 and Application Virtualization

What Is Industry 4.0 Industry 4.0 – The first industrial revolution was powered by steam—the second, by electricity and the assembly lines that led to mass production. Automation led the third revolution from the 1960s onward. For instance, General Motors installed robotic arms to assist their assembly lines in 1961.     Today, we are entering the fourth industrial revolution, or as many prefer to call it, Industry 4.0. In this technological paradigm, computers and automation will come together in a new and innovative way. Artificial Intelligence Continue Reading

BPM Meets Mobile: Low-code Development

As the wave of digital transformation disrupts businesses, each day the landscape of almost every industry is looking increasingly different than the one we were all familiar with. Companies are continuously looking at ways to improve their operations and logistics to give them a jump on their competitors. Change is Continue Reading

Healthcare Software and How to Use it on Any Device

Healthcare Software – The healthcare industry faces several challenges when it comes to managing IT infrastructure, including managing legacy applications and hardware, complying with government data regulations, and adopting bring-your-own-device (BYOD) and choose-your-own-device (CYOD) policies. Healthcare IT departments and Chief Medical Officers (CMOs) have to provide nurses, doctors, and staff Continue Reading

Byline: Is Your Healthcare Data Safe? Three Questions to Ask

In the all-out war for data, the healthcare industry is getting hit the hardest. Experian’s fourth annual 2017 Data Breach Industry Forecast states that healthcare organizations will be the most targeted sector for attack, with new and sophisticated attacks emerging. If healthcare organizations and their IT teams aim to keep data safe, Continue Reading

How Advanced Threat Protection Can Help Protect Financial Data

Technology integration in the financial services industry has opened opportunities that could only be dreamed of a few decades back. Around the turn of the millennium, we began seeing banks set up websites for internet-based banking, and about a decade later, mobile banking customers began tapping their smartphones to make Continue Reading

Infographic: Protecting Patient Data in Today’s Digital World

The healthcare industry continues to ride the digital wave to improve patient care and organizational efficiency while reducing costs. To do this, hospitals and health systems are relying on electronic health records (EHRs), the cloud, and the Internet of Things (IoT) more than ever. While these technologies are convenient, efficient, Continue Reading

Byline: Solving IoT Security – Pursuing Distributed Security Enforcement

For many of us in the Security Industry, the possibility of using Internet of Things (IoT) devices as a launchpad for an attack has been mostly theoretical. However, information obtained after the massive distributed denial-of-service (DDoS) attack against the services offered by DYN.com appears to show that the threat is Continue Reading

Byline: Is it Finally Time for Open Security?

One of the distinct advantages of working in the IT industry for over 35 years is all of the direct and indirect experience that brings, as well as the hindsight that comes with that. One of the more personally interesting experiences for me has been watching the growth and ultimate Continue Reading

Protect Your Patients with Internal Segmentation Firewalls

Those responsible for keeping patient data safe in the healthcare industry generally agree that there isn’t a single perimeter security solution that addresses all of today’s threats. Further, in traditional networks of the recent past, attacks that were able to bypass edge security solutions had clear access to the internal Continue Reading

>