Et Cetera

Tue
30
Aug

Personal Medical Devices

Contributed by Ann Funk

Technology in any field has been growing at a rapid pace, but one of the field’s that has seen the fastest growth would be that of the medical community. With this fast growth, security management and security of personal medical equipment has become a huge concern, especially with the field of personal medical devices. In this paper we will define what personal medical devices are, as well as discuss some of the threats and challenges that surround them. Some of the biggest threats against personal medical devices will be identified, in addition to, some of the solutions that can help keep these devices safe, not only now but also in the future.

This document is in PDF format. To view it click here.

Mon
22
Aug

Adopting IPv6 in the Enterprise

Contributed by LoyCurtis Smith

Tue
16
Aug

Defending the Front Lines: Why the fight against malware is failing?

Contributed by L. Taron Mattocks

Technology pervades all aspects of our society. The statement appears fairly innocuous but we tend to stereotype technology to high level mainframes and enterprise structures. The reality of the statement is that many computers are no different from the consumer products bought in a local retail store. Many institutions buy large quantities of machines at wholesale prices. The problems that users experience at home, however, carry over to their office.

This document is in PDF format. To view it click here.

Wed
03
Aug

Web Proxy Servers

Contributed by Billy Short

Tue
26
Jul

Effective Vulnerability Management Using Qualysguard

Contributed by Boyd Aaron Sigmon

In the Information Security field, being proactive is often better than being reactive, especially when it comes to the ever-growing vulnerabilities in today’s software and operating systems. In order for an organization to be proactive, implementing an effective vulnerability management program is a necessity and can drastically reduce the amount of risk and incidents associated with cyber security attacks.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Et Cetera