Category: Endpoint Security: Corporate Network Protection

This image was designed by Creativeart, can be found at https://www.freepik.com/free-photo/doctor-reviewing-a-tablet_926688.htm

Cyber Threats That are Lurking in Hospital Environment

Healthcare technologies are saving and enhancing patients’ lives with wearable devices that can monitor patients’ health and apply medication according to values of the patient, such as insulin pumps, pacemakers and so on. Also, it provides storage for Electronic Health Records, which is used to see patients’ history very quickly and evaluate patients’ condition effectively ...

Designed by Freepik hrehttps://www.freepik.com/free-vector/human-skull-drawing_756290.htm https://www.freevector.com/pray-for-japan#

TRITON: The Malware That Could Have Killed Hundreds

In December 2017, a Middle Eastern oil and gas petrochemical plant was attacked by malware named TRITON, also known as TRISIS or HatMan. It targeted the plant’s Safety Instrumented System that is a part of Industrial Control Systems. ICS vs SIS Industrial Control Systems (ICS) are computer-based devices that are used by engineers to monitor ...