• Home
  • About the Author
  • Calendar
  • Publications
  • Contact

Cyber Thoughts

Cybersecurity and Privacy for the Healthcare Life Sciences industry

Cisco

The following page provides links to popular Cisco security resources




Cisco Security Resources
  • Briefing Papers
    • SOC Maturity Slide
    • SOC Maturity Excerpt
  • Cisco Video
    • Ransomware - An Anatomy of an attack
    • A CISO’s Dilemma
    • Anatomy of an IoT Attack
    • Lights Out
    • The Power of Connection
    • Cisco Security Report 2017 Highlights
    • Cisco Security Report 2016 Highlights
  • Cisco Healthcare
    • Cisco Healthcare Security Service
    • Strategic Security Roadmap Service
    • Regulatory and Internal Compliance
    • Cisco Holistic Security Services
  • Cisco Segmentation
    • Cisco Security Segmentation Service
    • TrustSec Software- Defined Segmentation
    • Segmentation Design Guide
    • Cisco Medical NAC
    • Cisco BioMed NAC Brochure
    • Cisco BioMed NAC AAG
  • Cisco SecOps
    • Cisco Advanced Threat Analytics Service
    • Cisco Incident Response Retainer
    • Cisco Security Digital Profile Service
    • Cisco Ransomeware Defense
    • Cisco Umbrella Roaming


Home
Subscribe to: Posts (Atom)

Social Profiles

Twitter LinkedIn Xing Tumblr YourTube Cylera Cisco Denver University Wembley Partners Cyber Associates Richard Contact RSS Feed
  • Popular
  • Tags
  • Blog Archives

Welcome

Welcome
Cyber Thoughts is dedicated to the disclosure and discussion of cybersecurity events, trends and concerns impacting the global healthcare and life sciences industry. If this is an area of interest for you, please feel free to subscribe to the email RSS feed below, so you don’t miss anything.

Cyber Thoughts welcomes the participation of readers via the comments section of articles and from qualified guest bloggers, healthcare practitioners and cybersecurity thought leaders.

Original stories and articles may be republished for free provided that attribution is provided to the source and author.

About The Author

About The Author
Richard Staynings

Pages

  • Interviews and Articles
  • Academic Publications & Books
  • Speakers Bio
  • Calendar
  • Past Presentations
  • A New Use for Cheese Graters
  • Security World

Maturity Paradox

There is a danger that our appetite for new medical technology and digital maturity is allowed to outpace our adoption of cyber maturity leading to huge gaps in our security.

Anatomy of an Attack

Ever wondered how a hacker gets inside your network? It's remarkably easy. Watch this carefully! (You might want to maximize the window so as not to miss anything).

Hacking IoT is easy!

Still think that your IoT isn’t a risk to your business network and applications. It’s remarkably easy. Watch this carefully! (You might want to maximize the window so as not to miss anything).

Beekeeper Attack

Share this with elderly friends and relatives. This is how hackers steal all your money.


Translate

A Career in Cybersecurity

A Career in Cybersecurity
Considering your career options and interested in getting into a role in cybersecurity? This may be for you.

Featured Interview

Livestream interview from the HIMSS AsiaPac Conference in Bangkok, Thailand.

Featured Post

Security and the Board

Not long ago I was asked to attend a quarterly Board meeting of one of my healthcare clients and to present the recommendations of a Stra...

Blog Archive

  • ▼  2025 (5)
    • ▼  April (1)
      • What is Cyber Espionage and why is it so concerning?
    • ►  March (1)
    • ►  February (1)
    • ►  January (2)
  • ►  2024 (10)
    • ►  December (1)
    • ►  October (3)
    • ►  September (2)
    • ►  August (1)
    • ►  June (1)
    • ►  March (1)
    • ►  February (1)
  • ►  2023 (10)
    • ►  December (2)
    • ►  October (1)
    • ►  July (2)
    • ►  June (1)
    • ►  May (1)
    • ►  April (1)
    • ►  March (1)
    • ►  February (1)
  • ►  2022 (22)
    • ►  December (2)
    • ►  November (2)
    • ►  October (2)
    • ►  September (1)
    • ►  August (3)
    • ►  May (1)
    • ►  April (2)
    • ►  March (7)
    • ►  February (2)
  • ►  2021 (5)
    • ►  December (1)
    • ►  November (1)
    • ►  October (2)
    • ►  July (1)
  • ►  2020 (22)
    • ►  December (3)
    • ►  November (3)
    • ►  October (2)
    • ►  September (2)
    • ►  August (3)
    • ►  July (1)
    • ►  June (1)
    • ►  May (2)
    • ►  April (3)
    • ►  March (2)
  • ►  2019 (19)
    • ►  December (2)
    • ►  November (1)
    • ►  October (5)
    • ►  September (2)
    • ►  July (1)
    • ►  May (2)
    • ►  April (1)
    • ►  March (3)
    • ►  February (1)
    • ►  January (1)
  • ►  2018 (14)
    • ►  December (1)
    • ►  November (2)
    • ►  October (3)
    • ►  September (3)
    • ►  July (1)
    • ►  June (1)
    • ►  April (1)
    • ►  February (1)
    • ►  January (1)
  • ►  2017 (18)
    • ►  December (1)
    • ►  November (1)
    • ►  October (1)
    • ►  September (2)
    • ►  August (1)
    • ►  July (2)
    • ►  May (1)
    • ►  April (4)
    • ►  March (1)
    • ►  February (2)
    • ►  January (2)
  • ►  2016 (18)
    • ►  December (1)
    • ►  November (4)
    • ►  October (4)
    • ►  September (1)
    • ►  July (3)
    • ►  May (1)
    • ►  March (2)
    • ►  February (1)
    • ►  January (1)
  • ►  2015 (3)
    • ►  July (1)
    • ►  April (1)
    • ►  March (1)
  • ►  2014 (9)
    • ►  June (2)
    • ►  May (2)
    • ►  April (5)

Contact Form

Name

Email *

Message *

 
Created by Staynings Info Sec
Copyright © Cyber Thoughts
Read our Privacy Notice