Whitepapers
Whitepaper
Local and Decentralized Computing
April 18, 2022

This whitepaper provides an overview of the challenges resulting from the proliferation of a digitally interconnected society and the technology being implemented to address these challenges – specifically, the shift from a cloud-based computing to edge-based computing.

Whitepaper
Supply Chain Attack, Concerns, and Remediation
February 25, 2021

The compromise of the SolarWinds Orion Network Configuration Manager Update (referred to as Orion onward) has been in the news since its discovery in December 2020. The impact of this cyberattack on a software supply chain (attacking a vendor’s software update build) is quite extensive and poses a significant risk for the downstream customers. The sophistication of the attack and the organizations that were ultimately targeted is astonishing and terrifying. However, this is only the tip of the iceberg. How deeply an organization has been compromised or what intellectual property was exfiltrated is yet to be fully determined.

Whitepaper
January 7, 2021

The owner of a consumer electronics company locks the doors and arms the burglar alarm system and the end of a workday. Later that night, she receives a call from the police informing her that thieves have driven a truck straight through a loading dock door, filled the truck with the most popular video gaming system products and left the scene before they could respond.

Whitepaper
By Elizabeth Marazzo, Information Technology Risk Control
October 1, 2020

Medicine plays a vital role in safeguarding public health throughout the world. Pharmaceutical companies develop medicines to treat and cure sickness and disease. However, despite these noble intentions, occasionally substances created for a specific therapeutic purpose become dangerous. Heroin, for example, was introduced in 1898 as a therapeutic drug but was later determined to be highly addictive, leading to significant abuse. Since then, numerous pharmaceuticals products developed for specific therapeutic uses have been proven to be moderately to highly addictive, resulting in overdoses and deaths.

Whitepaper
By Tushar Nandwana, Information Technology Risk Control
June 22, 2020

The idea of being effortlessly chauffeured by self-driving cars or autonomous vehicles (AV), has been a dream of futurists for several decades. They envision a time where we will simply input our destination and be safely driven there while we do work, relax, watch a movie, or even take a nap. Commercially, trucks will self-drive in platoon formations 24 hours a day transporting goods from one part of the country to another.

Whitepaper
Norine McVann, Information Technology Risk Control
October 8, 2019

Protecting and controlling access- whether to an office building or an operating system- is an ever evolving security challenge. With ongoing advancements in technology, the option to utilize biometric security controls is becoming more widely available.

Whitepaper
By Elizabeth Marazzo, Information Technology Risk Control
June 12, 2019

3D printing technology is probably one of the greatest inventions of our lifetime. Given its potential “to revolutionize the way we make almost everything,”1 it is developing rapidly. That evolution has repositioned this once prohibitively expensive resource as affordable, making it accessible to many, manufacturers and consumers alike. The immediate challenge that people new to 3D printing face is distinguishing between its different processes and materials. In fact, the term 3D printing is actually an umbrella term that encompasses a variety of 3D printing processes. This paper will focus on 3D metal printing.

Whitepaper
By Michael Campbell, Medical Technology Risk Control Manager
January 14, 2019

In 2003, the National Institute of Health’s (NIH) “Human Genome Project” (HGP) announced that it had completed its research involving the mapping of the entirety of the human genome. It revealed that there are over 20,000 individual genes in the human body, providing scientists and others with detailed information about the structure, organization and function of the human genome, along with a basic set of genetic patterns for the development and function of a human being.

Whitepaper
Tushar Nandwana, Information Technology Risk Control
October 30, 2018

This paper is part 1 of 2 we have authored on the topic of blockchain. Part 1 delves into more detail on the technology of a blockchain and how it operates.

Whitepaper
Tushar Nandwana, Information Technology Risk Control
October 30, 2018

This paper is part 2 of 2 on the topic of blockchain. Part 1 provides technical insight on the blockchain technology that is the foundation of the Bitcoin and Ethereum cryptocurrencies, one of the most recognizable applications of blockchain technology. Part 2 is less technical as it reviews different types of blockchain platforms, business applications using this technology and how it may soon revolutionize certain enterprise and consumer transactional processes.