For connected medical devices, cyberattacks are a massive threat to patient safety. As BLE connectivity for IoMT devices becomes more prevalent, protocol fuzzing validation will become even more critical in maintaining patient safety and trust in advancing technologies.
Vice President, Security Solutions at Keysight Technologies
Scott Register has more than 15 years of experience leading product management operations for global technology companies and is currently vice president of security solutions for Keysight Technologies. Prior to his current role, Register was vice president of product management leading the development of Ixia’s new products in the areas of security, virtualization and cloud. He also spearheaded the company’s visibility product line. Register brings to Keysight broad experience in managing enviable growth across a diverse range of environments, from embryonic to VC-backed startup to multi-hundred-million-dollar product lines. Innovative and energetic, Register has a strong history of successful engagements with customers, channels, and business partners on a global basis.
Log4j usage is widespread, with billions of Java-enabled systems out there and is trivially easy to exploit. Here are key strategies to better protect your organization in both the short and long term.