Securing medical devices: Can a hacker break your heart?
Why are connected medical devices vulnerable to attack and how likely are they to get hacked? Here are five digital chinks in the armor.
Education: CISSP, RHCSA
Highlights of your career? Reverse engineering human brain patterns.
What malware do you hate the most? Nation state sponsored low and slow.
Favorite activities? Building and flying airplanes.
What is your golden rule for cyberspace? Stupid hurts.
When did you get your first computer and what kind was it? 1988, Radio Shack TRS-80.
Favorite computer game/activity? Java/Big Data algorithms to find brain patterns.
Why are connected medical devices vulnerable to attack and how likely are they to get hacked? Here are five digital chinks in the armor.
Cameron CampYou don’t need a degree in cybersecurity or a bottomless budget to do the security basics well – here are five things that will get you on the right track
Cameron CampIt’s easy to reset your password or PIN after a data breach. But reset your face? Not so much.
Cameron CampWith the big voting day rapidly approaching, can the security of the election still be shored up? If so, how?
Cameron CampAs work from home is the new norm in the coronavirus era, you’re probably thinking of enabling remote desktop connections for your off-site staff. Here’s how to do it securely.
Aryeh Goretsky and Cameron CampRemote work can be much safer with the right cyber‑hygiene practices in place – multi‑factor authentication is one of them
Cameron CampAs the COVID-19 pandemic has many organizations switching employees to remote work, a virtual private network is essential for countering the increased security risks
Cameron CampAnd how would you know if the algorithm was tampered with?
Cameron CampWhat the human battle against biological viruses can teach us about fighting computer infections – and vice versa
Cameron CampNo more default logins on new IoT devices if UK legislators get their way
Cameron CampAs software becomes more important than ever, how can engaging the security industry make the road ahead less winding?
Cameron CampNo one has a road map for securing a connected city – but there should be a whole atlas of such maps
Cameron CampSmart selections when starting small can ease the pain as you scale up your company’s privacy infrastructure
Cameron CampHow the field of play has changed and why endpoint protection still often comes down to doing the basics, even in the face of increasingly complex threats
Cameron CampAttention-grabbing cyberattacks that use fiendish exploits are probably not the kind of threat that should be your main concern – here's what your organization should focus on instead
Lysa Myers and Cameron CampAfter welcoming hacking research, automobile technology started to get better at defending against hacks. So why has the airline industry not been as welcoming?
Cameron CampProtecting your privacy is no longer just an option but a legal requirement in many parts of the world
Cameron CampSome things that businesses can do to get better at it without breaking the bank
Cameron CampIn our final report from CES we take a look at smart city initiatives
Cameron CampThere’s a digital treasure trove to be had in your home so you should take steps to protect it
Cameron Camp