Petronella Cybersecurity and Compliance Blog

Blog Authors

Latest from Petronella Cybersecurity and Compliance Blog

Send us a textSarah brings 35 years of clinical expertise to our conversation, revealing how relationship therapy has transformed from a one-dimensional approach to a comprehensive science-based system. As founder of Relate Center in Austin, Texas, she’s pioneered an integrated method combining physical therapists, psychotherapists, and physicians to address both emotional and physical dimensions of relationships.The digital transformation of

Send us a textNestled along the scenic Southern Oregon coast, Southern Coos Hospital faces a unique set of challenges that many healthcare organizations never encounter. With just 25 beds serving a rural population of about 15,000, this critical access hospital demonstrates remarkable innovation in stretching limited resources while maintaining robust cybersecurity practices.Scott, the hospital’s CIO who transitioned from fundraising

Send us a textSurgical robotics stands at the fascinating crossroads of cutting-edge technology and life-saving medical innovation. Dave Saunders, a seasoned technology leader with three decades of experience spanning from early internet protocols to modern surgical robotics, takes us deep into this revolutionary field.The stakes couldn’t be higher when developing robots that hold surgical instruments. Saunders explains why patient

Lunch and Learn Presentation Hosted by Craig Petronella. Video Available at https://youtu.be/OIuxhkb-Njk – Imagine a world where your family’s online interactions are as secure as fort Knox, yet as open as a summer’s day in the park. That’s the reality we’re aiming for in this gripping discussion on digital safety. In this episode, we illuminate the often overlooked naivety of

Unlock the mysteries of cybersecurity and learn to navigate the complexities of compliance with expert insights from Bala Ramaya, CEO of ISSquared. This episode takes you on a journey through the evolving world of managed service providers, shedding light on how IA Squared transformed itself into a cybersecurity force. Bala not only shares the company’s bootstrapped origins but also reveals

Unlock the secrets to ironclad API security with Jeremy Snyder of Firetail as we navigate the often treacherous terrain of digital safety. Peering into the murky depths of API exploitation, Jeremy brings clarity to how Firetail’s cutting-edge tools not only bolster developers’ efforts in constructing impenetrable APIs but also stand guard, thwarting real-time threats. Our digital lives, intertwined with these

Prepare to navigate the turbulent skies of cybersecurity with Sige Brody, CTO of Optinine, as we unpack the pressing dangers and defenses within the aviation sector. Discover how Optinine’s managed cloud computing services are revolutionizing the way airlines protect their most valuable assets, with a focus on robust disaster recovery and business continuity. Our journey will reveal the startling reality

Imagine discovering that the very foundations of your financial security have been compromised by one of the most infamous crypto-heists in history. That’s the chilling tale we unravel from the 2016 Bitfinex breach, with a staggering $4.5 billion at stake. We join forces with cybersecurity experts and dive into the cutting-edge blockchain forensics that led to the recent arrests, providing

Join Blake Rea and Craig Petronella as we unwrap the latest tech and cybersecurity developments faster than you can tear through holiday gift wrapping. From the FBI’s tactical strike against the Black Cat ransomware group to the Xfinity data breach leaving millions on edge, we cover it all. We also weigh the consequences of vengeful IT maneuvers in educational institutions

What if you could protect your cryptocurrency from hackers with just a few simple security measures? That’s what we’re diving into today in our exploration of the fascinating yet terrifying world of SIM Swaps and cryptocurrency security. We’ll shed light on a real-life cautionary tale of a victim who lost his cryptocurrency to these cunning cyber con artists and the