Historically “Indicator of Compromise” appears as a result of compromise. That’s why there is still an illusion that the attacker is one step ahead of his victim. However, the asymmetry can be removed. Classical methods of collecting and processing attributes of an attacker, who has already left his tracks somewhere, can be supplemented and enriched with a new source of IoCs – the Proactive Threat Intelligence.
The latest results of security assessments that have been performed for various medical organizations and vulnerability research of most popular medical web-applications will be presented at
The small regional and first in Egypt BSides will be hosted in Cairo next week. I’m glad to support the local community of researchers with my talk “The S in IoT stands for Security: mitigating new entry points to the jewels“.
Almost two years I’ve been focused on cyber security of Smart Medicine. The result was collected in the 3 big reports.