Cybersecurity as Automobile Product Differentiator
Safety is a big selling point. Auto manufacturers should make automobile cybersecurity a safety selling point too, as more and more internet-connected features pose increased threats.
5 Cybersecurity Keys to Protect Your Digital Assets Now
Five keys to keeping cyber attackers from finding and exploiting the chink in your cybersecurity armor.
3 Ways New FDA ISAO Will Help Healthcare Cybersecurity
Healthcare organizations, medical device manufacturers, consultancies, and related entities can participate in and benefit from new FDA ISAO partnership with Sensato
6 Weak Links in Blockchain Cybersecurity
While it’s touted as “secure,” the blockchain has some cybersecurity weak links. Organizations looking to move business to the blockchain should keep these “6 weak links” in mind.
Three Reasons Why Honeypots Should be on Your Cybersecurity Menu
Honeypots offer fast breach detection, forensics, and sweet, sweet counter measures. That’s why they’re the one thing cyber attackers fear and CISOs should be sure to include in the cybersecurity mix.
Healthcare Apps: More Consumer Control Means More IT Headaches
Consumer healthcare apps like Apple EHR, MyTeleMed, Kareo, and others have the American Hospital Association worried. Six points of protection help safeguard critical systems and data from cyberattacks on mobile healthcare apps.
Threat Intelligence Briefing: Russian Cyberattackers Going After U.S. Critical Infrastructure
Russia has compromised hundreds of U.S. companies in the critical infrastructure sector, including electric, nuclear, aviation, manufacturing, government, and healthcare. Sensato CEO discusses the attack and how organizations can protect themselves.
Cyber Attackers Are Using AI: Are You Ready?
Like a virus that mutates and evolves to evade inoculation-or like artificial intelligence itself-cyber criminals are constantly finding ways to exploit AI and machine learning. AI deployment by cybersecurity experts will be essential for protecting healthcare organizations.
SamSam Calls for Good Cybersecurity Hygiene, Especially Among Healthcare Organizations
SamSam ransomware has already extracted $1 million in ransom from select targets in 2018. This unique attacker relies on known vulnerabilities, making all cybersecurity practices imperative for healthcare organizations. 
Biometric Authentication
Authentication in and outside of computing can be done in one of three ways. It can be based on something you know, such as a password. It can be based on something you have, such as a keycard. Or it can be based on something that you are. That’s where biometrics comes in.
What Does Federal Fracas Mean for Healthcare Cybersecurity?
It is the responsibility of each healthcare organization to protect itself, and its patients. An effective cybersecurity solution must be leveraged to protect patient lives from security shortcomings, regardless of what is happening at the federal or state level.
The General Data Protection Regulation
The primary objective of GDPR is to strengthen security and privacy protection for individuals. While GDPR shares many principles from its predecessors, consisting of 11 chapters, 99 articles, and 187 recitals, it is by no means a minor adaptation.
Risk Assessment is a Healthcare Cybersecurity Best Practice—Because What You Don’t Know CAN Hurt You
Risk assessment in the healthcare industry is imperative. Every health system is at risk, but a comprehensive cybersecurity solution can help to detect potential risks in your healthcare organization, and across the industry.
No Plan Survives First Contact: Is your Incident Response Plan Up to the Challenge?
After spending a considerable amount of time researching these and other challenges common to ineffective cybersecurity incident response programs, we identified components that are required for effective Incident Response Plan (IRP).
Orangeworm Threat Intelligence Briefing
This attack has gained a good amount of momentum in the past weeks. Given the tactics employed by the attackers we believe they are performing advanced staging for additional attacks and compromise. This could be part of a criminal organization who intends to utilize this vector as a espionage-as-a-service program or a terrorist organization who may employ cyber-munitions at a later date.
The “Side Effect” Cyberattack Threatens Everyone: Is Your Healthcare Org Protected?
You don’t have to be the actual target. Yet you could still suffer the catastrophic damage of a cyber-munition attack.
Healthcare Cybersecurity Best Practice: Make Every Employee a Human Firewall
Ideally, every employee in a healthcare organization should be a human firewall.
Cybersecurity Incident Response Planning: Time Well Spent
There’s an old legend that Albert Einstein was once asked: If he had only one hour to save the world, how would he spend it? According to the legend, Einstein said he would take 55 minutes to define the problem and 5 minutes to solve it.
Crawl, Walk, Run to this Healthcare IT Security Best Practice: Segmentation
Segmenting may seem like an inefficient way to defend against cyberattack. Instead, it's a critical piece to creating a safer, more reliable defense against cyberattack.
Sensato’s To-Do List for Every Healthcare Organization: Cybersecurity in the Internet of Everything
“Everything that makes healthcare more efficient, every access point, new device, or algorithm, for every positive there’s a negative: risk and vulnerability.”
Knock Knock: Quantum Computing
The moment a computer is invented that is fast enough to break current cryptography, we, as cybersecurity professionals will have a whole new reality to deal with. Guess what? Quantum computing is here.
SOC Myths & Fallacies: Why Do Most Security Operations Centers Fail?
Over the course of a year long investigation, we interviewed CIO, CISO, managers, security analysts, security engineers and compliance officers. Find out what we learned.
Rationalization Creates a False Sense of Cybersecurity
Facing the audacity of evil: when it comes to information technology and medical device security for healthcare organizations, believing your perceptions—or your rationalizations—can be dangerous.
Endless, Terrifying Possibilities: This is Why You Need a Good Medical Device COP
Here’s a scary thought: There is no HIPAA-type (Health Insurance Portability and Accountability Act) regulation designed to save a human life from a medical device cyberattack.
Self-Defense & Cyberwar
As someone who may be responsible for protecting a network, facilities or people, the evolution of cyberweapons and your rights to defend yourself will become a rather critical aspect of your strategies in the coming years.
The Axis of Evil: Your Goodness Puts You at Risk
I am often asked, "what is the biggest challenge faced by a CIO or CISO trying to secure their environment?" My answer is always "they are good people."
North Korea Cyber Threat Intelligence Briefing
Sensato's North Korea Cyber Threat Intelligence Briefing examines the potential risks that North Korea possibly posses to U.S based critical infrastructure organizations.
We're Just Getting Started
When we started back in 2013, we had a simple vision—to continually innovate, to be different, to challenge the status quo, to point out that the emperor has no clothes.
Cybersecurity as Automobile Product Differentiator
Safety is a big selling point. Auto manufacturers should make automobile cybersecurity a safety selling point too, as more and more internet-connected features pose increased threats.
5 Cybersecurity Keys to Protect Your Digital Assets Now
Five keys to keeping cyber attackers from finding and exploiting the chink in your cybersecurity armor.
3 Ways New FDA ISAO Will Help Healthcare Cybersecurity
Healthcare organizations, medical device manufacturers, consultancies, and related entities can participate in and benefit from new FDA ISAO partnership with Sensato
6 Weak Links in Blockchain Cybersecurity
While it’s touted as “secure,” the blockchain has some cybersecurity weak links. Organizations looking to move business to the blockchain should keep these “6 weak links” in mind.
Three Reasons Why Honeypots Should be on Your Cybersecurity Menu
Honeypots offer fast breach detection, forensics, and sweet, sweet counter measures. That’s why they’re the one thing cyber attackers fear and CISOs should be sure to include in the cybersecurity mix.
Healthcare Apps: More Consumer Control Means More IT Headaches
Consumer healthcare apps like Apple EHR, MyTeleMed, Kareo, and others have the American Hospital Association worried. Six points of protection help safeguard critical systems and data from cyberattacks on mobile healthcare apps.
Threat Intelligence Briefing: Russian Cyberattackers Going After U.S. Critical Infrastructure
Russia has compromised hundreds of U.S. companies in the critical infrastructure sector, including electric, nuclear, aviation, manufacturing, government, and healthcare. Sensato CEO discusses the attack and how organizations can protect themselves.
Cyber Attackers Are Using AI: Are You Ready?
Like a virus that mutates and evolves to evade inoculation-or like artificial intelligence itself-cyber criminals are constantly finding ways to exploit AI and machine learning. AI deployment by cybersecurity experts will be essential for protecting healthcare organizations.
SamSam Calls for Good Cybersecurity Hygiene, Especially Among Healthcare Organizations
SamSam ransomware has already extracted $1 million in ransom from select targets in 2018. This unique attacker relies on known vulnerabilities, making all cybersecurity practices imperative for healthcare organizations. 
What Does Federal Fracas Mean for Healthcare Cybersecurity?
It is the responsibility of each healthcare organization to protect itself, and its patients. An effective cybersecurity solution must be leveraged to protect patient lives from security shortcomings, regardless of what is happening at the federal or state level.
Risk Assessment is a Healthcare Cybersecurity Best Practice—Because What You Don’t Know CAN Hurt You
Risk assessment in the healthcare industry is imperative. Every health system is at risk, but a comprehensive cybersecurity solution can help to detect potential risks in your healthcare organization, and across the industry.
No Plan Survives First Contact: Is your Incident Response Plan Up to the Challenge?
After spending a considerable amount of time researching these and other challenges common to ineffective cybersecurity incident response programs, we identified components that are required for effective Incident Response Plan (IRP).
Healthcare Cybersecurity Best Practice: Make Every Employee a Human Firewall
Ideally, every employee in a healthcare organization should be a human firewall.
Cybersecurity Incident Response Planning: Time Well Spent
There’s an old legend that Albert Einstein was once asked: If he had only one hour to save the world, how would he spend it? According to the legend, Einstein said he would take 55 minutes to define the problem and 5 minutes to solve it.
Crawl, Walk, Run to this Healthcare IT Security Best Practice: Segmentation
Segmenting may seem like an inefficient way to defend against cyberattack. Instead, it's a critical piece to creating a safer, more reliable defense against cyberattack.
Sensato’s To-Do List for Every Healthcare Organization: Cybersecurity in the Internet of Everything
“Everything that makes healthcare more efficient, every access point, new device, or algorithm, for every positive there’s a negative: risk and vulnerability.”
Endless, Terrifying Possibilities: This is Why You Need a Good Medical Device COP
Here’s a scary thought: There is no HIPAA-type (Health Insurance Portability and Accountability Act) regulation designed to save a human life from a medical device cyberattack.
We're Just Getting Started
When we started back in 2013, we had a simple vision—to continually innovate, to be different, to challenge the status quo, to point out that the emperor has no clothes.
Biometric Authentication
Authentication in and outside of computing can be done in one of three ways. It can be based on something you know, such as a password. It can be based on something you have, such as a keycard. Or it can be based on something that you are. That’s where biometrics comes in.
Risk Assessment is a Healthcare Cybersecurity Best Practice—Because What You Don’t Know CAN Hurt You
Risk assessment in the healthcare industry is imperative. Every health system is at risk, but a comprehensive cybersecurity solution can help to detect potential risks in your healthcare organization, and across the industry.
Orangeworm Threat Intelligence Briefing
This attack has gained a good amount of momentum in the past weeks. Given the tactics employed by the attackers we believe they are performing advanced staging for additional attacks and compromise. This could be part of a criminal organization who intends to utilize this vector as a espionage-as-a-service program or a terrorist organization who may employ cyber-munitions at a later date.
Sensato’s To-Do List for Every Healthcare Organization: Cybersecurity in the Internet of Everything
“Everything that makes healthcare more efficient, every access point, new device, or algorithm, for every positive there’s a negative: risk and vulnerability.”
SOC Myths & Fallacies: Why Do Most Security Operations Centers Fail?
Over the course of a year long investigation, we interviewed CIO, CISO, managers, security analysts, security engineers and compliance officers. Find out what we learned.
Endless, Terrifying Possibilities: This is Why You Need a Good Medical Device COP
Here’s a scary thought: There is no HIPAA-type (Health Insurance Portability and Accountability Act) regulation designed to save a human life from a medical device cyberattack.
Self-Defense & Cyberwar
As someone who may be responsible for protecting a network, facilities or people, the evolution of cyberweapons and your rights to defend yourself will become a rather critical aspect of your strategies in the coming years.
North Korea Cyber Threat Intelligence Briefing
Sensato's North Korea Cyber Threat Intelligence Briefing examines the potential risks that North Korea possibly posses to U.S based critical infrastructure organizations.
No Plan Survives First Contact: Is your Incident Response Plan Up to the Challenge?
After spending a considerable amount of time researching these and other challenges common to ineffective cybersecurity incident response programs, we identified components that are required for effective Incident Response Plan (IRP).
The “Side Effect” Cyberattack Threatens Everyone: Is Your Healthcare Org Protected?
You don’t have to be the actual target. Yet you could still suffer the catastrophic damage of a cyber-munition attack.
Knock Knock: Quantum Computing
The moment a computer is invented that is fast enough to break current cryptography, we, as cybersecurity professionals will have a whole new reality to deal with. Guess what? Quantum computing is here.
SOC Myths & Fallacies: Why Do Most Security Operations Centers Fail?
Over the course of a year long investigation, we interviewed CIO, CISO, managers, security analysts, security engineers and compliance officers. Find out what we learned.
Rationalization Creates a False Sense of Cybersecurity
Facing the audacity of evil: when it comes to information technology and medical device security for healthcare organizations, believing your perceptions—or your rationalizations—can be dangerous.
Self-Defense & Cyberwar
As someone who may be responsible for protecting a network, facilities or people, the evolution of cyberweapons and your rights to defend yourself will become a rather critical aspect of your strategies in the coming years.
The Axis of Evil: Your Goodness Puts You at Risk
I am often asked, "what is the biggest challenge faced by a CIO or CISO trying to secure their environment?" My answer is always "they are good people."
The General Data Protection Regulation
The primary objective of GDPR is to strengthen security and privacy protection for individuals. While GDPR shares many principles from its predecessors, consisting of 11 chapters, 99 articles, and 187 recitals, it is by no means a minor adaptation.
We're Just Getting Started
When we started back in 2013, we had a simple vision—to continually innovate, to be different, to challenge the status quo, to point out that the emperor has no clothes.