Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

NCCOE Heralds Release of NIST SP 1800-8 Securing Wireless Infusion Pumps

May 09, 2017 by Marc Handelman in All is Information, Control Systems, Defensive Infosec, Demise of Privacy, Hardware Security, Health Care Security, Health, Information Security, Medical Device Security, NIST NCCoE, NIST

The National Institute of Standards and Technology (NIST) National Center for Cybersecurity Excellence (NCCOE) has released it's latest draft medical device related security document, entitled 'NIST Special Publication 1800-8 Cybersecurity Special Publication 1800-8 Securing Wireless Infusion Pumps - In Healthcare Delivery Organizations'. Authored by Gavin O'Brien, Sallie Edwards, Kevin Littlefield, Neil McNab, Sue Wang and Kangmin Zheng - the document is available as either a PDF or web-based artifact. Enjoy.

"Medical devices, such as infusion pumps, were once standalone instruments that interacted only with the patient or medical provider. With technological improvements designed to enhance patient care, these devices now connect wirelessly to a variety of systems, networks, and other tools within a healthcare delivery organization (HDO) – ultimately contributing to the Internet of Medical Things (IoMT)." - via the National Center for Cybersecurity Excellence (NCCOE)

May 09, 2017 /Marc Handelman
All is Information, Control Systems, Defensive Infosec, Demise of Privacy, Hardware Security, Health Care Security, Health, Information Security, Medical Device Security, NIST NCCoE, NIST

33c3, Netanel Rubin's 'On Smart Cities, Smart Energy, And Dumb Security' →

January 06, 2017 by Marc Handelman in All is Information, Utilities, Common Sense, Conferences, Control Systems, ICS/SCADA, Information Security, Smart Grids, Smart Meters
January 06, 2017 /Marc Handelman
All is Information, Utilities, Common Sense, Conferences, Control Systems, ICS/SCADA, Information Security, Smart Grids, Smart Meters

Whom Done It →

January 01, 2017 by Marc Handelman in All is Information, Alternate Attack Analysis, Control Systems, Critical Thinking, Cybersecurity Competence, Defense, Electrical Engineering, Electronic Warfare, Incident Handling, Information Security, Espionage, Cybersecurity

In what wraps up to be a superbly crafted screed penned by Glenn Greenwald, laboring at The Intercept; in which, the Good Mr. Greewald details the perceived falsehoods swirling about the alleged Russian Intelligence Services hacks of the Burlington Vermont electrical generation utility. Today's Must Read.

January 01, 2017 /Marc Handelman
All is Information, Alternate Attack Analysis, Control Systems, Critical Thinking, Cybersecurity Competence, Defense, Electrical Engineering, Electronic Warfare, Incident Handling, Information Security, Espionage, Cybersecurity

Judah Levine, Time Lord

March 09, 2016 by Marc Handelman in All is Information, Information Sciences, Time, Time Computation, Communications, Computation, Compute Infrastructure, Common Sense, Computer Science, Control Systems

The relatively (speaking) untold story of Judah Levine, Ph.D. and NIST. Enjoy!

March 09, 2016 /Marc Handelman /Source
All is Information, Information Sciences, Time, Time Computation, Communications, Computation, Compute Infrastructure, Common Sense, Computer Science, Control Systems

Radvanovsky's RuggedTrax →

December 02, 2015 by Marc Handelman in All is Information, Control Systems, ICS/SCADA, ICS, Information Sharing, Internetwork Security, Information Security

Bob Radvanovsky, of Infracritical SCADASEC fame and Critical Infrastructure Protection and Cyber Security Researcher, has completed the RuggedTrax project, and published the findings thereto. Outstanding work Mr. Radvanovsky.

December 02, 2015 /Marc Handelman
All is Information, Control Systems, ICS/SCADA, ICS, Information Sharing, Internetwork Security, Information Security
Samy Kamkar" by Vissago / Dan Tentler

Samy Kamkar" by Vissago / Dan Tentler

Kamkars' OnStar →

August 04, 2015 by Marc Handelman in All is Information, Automobile Security, Information Security, Control Systems, Network Security

And the slew of vehicle flaws just keep coming... Witness Samy Kamkar's superb research targeting the General Motors Corporation (NYSE: GM) OnStar product as the vector in to a relatively unexplored country. Watch the video, and I'm sure you will arrive at a similar comclusion...

Photo of Samy Kamkar Attrribution: "Samy Kamkar" by Vissago / Dan Tentler - http://www.flickr.com/photos/vissago/4861025347/. Licensed under CC BY 2.0 via Wikimedia Commons - https://commons.wikimedia.org*

August 04, 2015 /Marc Handelman
All is Information, Automobile Security, Information Security, Control Systems, Network Security