About Chuck Faughnan

This author has not yet filled in any details.
So far Chuck Faughnan has created 2 blog entries.

Why Healthcare Breaches Keep Looking Like Insiders Even When They Aren’t

Recent healthcare breaches keep following the same pattern: valid credentials, trusted workflows, and behavior that looks authorized until impact is obvious. This article explains why insider-like behavior is the common denominator and why behavior-based cohort analysis matters more than signature-centric controls.

By |2026-04-20T21:05:00+00:00April 18, 2026|Uncategorized|0 Comments

The Unagentable Blind Spot: Why CISOs Need Network-Level Visibility in Healthcare

Hospitals cannot agent, patch, or safely scan every system that matters. This post explains why the resulting blind spot has become a CISO-level risk—and why network behavior is the control plane that closes it.

By |2026-04-14T17:44:56+00:00April 7, 2026|Cybersecurity|0 Comments
Go to Top