By Dr. Kenneth Williams
Is the best way to protect against a hacker to hire one? Find out why some organizations are paying “white-hat hackers” to test their network’s protections and what you need to consider before hiring one.
By Dr. Kevin Harris
IoT devices are changing healthcare, but like any device connected to a network, they are vulnerable to cyberattacks. They must be protected to ensure patient care and the security of entire systems are not compromised.
By James J. Barney
Purdue Pharmacy, the company behind the painkiller Oxycontin, has filed for bankruptcy. However, this does not end litigation against the company for its role in the opioid crisis and may just be the beginning of a multi-year legal saga.
By Dr. Harry Cooper
Information breaches are often caused by personnel who unintentionally allow hackers to access private networks. Learn about ransomware and other methods hackers are using to mislead business employees and steal sensitive data.
By Dr. Scott Duryea
Non-interventionism is a foreign policy strategy that emphasizes diplomacy first, war second. Learn how the U.S. could enact such a strategy to make a shift from its current aggressive and expensive warfare approach to international relations.