The Healthcare CISO’s Guide to IoT Security: Protect Every Device with a 6-Step Approach to Clinical and Device Workflow Management

In this article, we bring to you Palo Alto Networks’ approach to implementing secure clinical and device workflow management in six steps. These steps constitute our definition of an ideal methodology that relieves both network security and clinical teams from the day-to-day operational burdens of securing and managing medical devices. With attack surfaces widening and …

Cybersecurity News Headlines Update on May 30, 2021

VMware Updates Address Flaws in vSphere Client. VMware has released updates to address two vulnerabilities in its vSphere Client. The first is a critical severity “remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Check plug-in.” The second is a moderate-severity “vulnerability in a vSphere authentication mechanism for the …

Cybersecurity News Headlines Update on April 24, 2021

iOS Now Lets Users Opt Out of Ad Tracking Apple’s newest update for iOS, version 14.5, includes a new features called App Tracking Transparency, which lets users choose whether or not to allow apps to track their activity across other apps and websites owned by other companies. App Tracking Transparency gives users granular control, allowing …